Nile has announced new security features for its Secure Network-as-a-Service platform. At its core is a zero-trust fabric ...
Four out of five cybersecurity leaders now use micro-segmentation to protect corporate networks, according to a new study by cybersecurity company Byos. Micro-segmentation is the creation of zones in ...
One of the most buzzworthy terms in cybersecurity right now is the high-concept, somewhat cryptic construct called zero trust. In a nutshell, it’s designed to strengthen and tighten cybersecurity ...
ORLANDO, Fla.--(BUSINESS WIRE)--TrueFort, the lateral movement protection company, today announced that the TrueFort Platform has received the prestigious Top InfoSec Innovator Award for Hot Company ...
LONDON--(BUSINESS WIRE)--ColorTokens, a pioneer in Zero Trust-based cybersecurity solutions, today unveiled Xshield 2.0, the latest version of its award-winning product, Xshield, part of the Xtended ...
Whether a company utilizes a private, hybrid or public cloud infrastructure or offers cloud services to others, it is critical that each cloud instance and service be isolated to help minimize the ...
In the realm of cybersecurity, guidance from authoritative bodies like the National Security Agency (NSA) often carries significant weight. However, recent articulations around zero-trust principles ...
Akamai Technologies, Inc. today announced a collaboration with Kyndryl to deliver Micro-Segmentation Implementation Services with Akamai Guardicore Segmentation. As network boundaries continue to ...
‘Just as the waterproof bulkheads in a submarine prevent adjacent compartments from becoming flooded in the event of a hull breach, Guardicore’s micro-segmentation contains the ‘blast radius’ from a ...
Ridge Security, an automated security validation solution provider, is releasing Ridge Security RidgeShield, an automated, cloud workload protection and testing solution. As organizations increasingly ...
To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below. be at least eight characters long be no more than 25 characters long contain at least one uppercase, ...