Rising breach numbers drive zero-trust adoption


Two-thirds of organizations responding to a new survey list cyber risk concerns as the most important drivers for implementing a zero-trust strategy.
A new report from the Entrust Cybersecurity Institute, based on research by the Ponemon Institute, shows the pattern is even more pronounced in the US, with 50 percent of organizations citing cyber breach risk and 29 percent reporting the expanding attack surface for a combined total of 79 percent.
Why a zero trust approach is essential to mitigate the threat of unsecured APIs


With the move to hybrid working, the rapid adoption of cloud, increased use of mobile and IoT devices, combined with the ongoing drive to modernize and transform IT operations, the attack surface of every organization has -- and continues to -- expand.
Traditional boundaries have been blurred between businesses, suppliers, partners, customers, workers, and even home-life, with this ecosystem continuing to grow. Here, APIs are providing the connective tissue for modern applications and legacy infrastructure to co-exist.
Is your zero trust program at risk of failure? [Q&A]


Zero trust is no longer a 'nice to have' for cybersecurity leaders. As organizations embrace hybrid and remote workforces, the volume of cyberattacks and data breaches involving unauthorized access to networks, applications and systems has surged.
In response, cybersecurity leaders are striving to adopt a zero trust approach to security to reduce the risk of data breaches, ransomware and insider threats. However, the success of these efforts are being undermined by a variety of factors.
Industry turns to zero trust


A new study of industrial enterprises shows 72 percent have started adopting zero trust principles, with 38 percent of organizations establishing, implementing, and optimizing zero trust control measures.
The study from Xage and Takepoint Research surveyed over 250 cybersecurity senior leaders across critical infrastructure organizations, energy, utilities, transportation, oil and gas and manufacturing to gauge the current state of zero trust implementation.
Hybrid work drives demand for secure networking technologies


According to a new study, 81 percent of IT professionals say hybrid work is driving demand for technologies like SASE and zero-trust networking.
The report from Aryaka surveyed over 200 IT, security and network professionals and finds SASE and SD-WAN are no longer seen as niche solutions. 84 percent of respondents believe SASE is either 'mature' or 'somewhat mature', with an even higher number (91 percent) saying the same about SD-WAN.
Zero Trust: Moving beyond the chewy centre of cybersecurity


As modern technology becomes increasingly complex, so does the task of securing it. Adding to the complexity is the proliferation of decentralised technology such as cloud adoption and IoT (Internet of Things), and the move to remote working which have changed how cybersecurity experts craft the defences for their systems.
In simpler days, IT systems were comparatively easy to ring-fence, as there was a solidly defined corporate security perimeter, or “trust boundary.” This formed the basis of the classic, trust-based security strategy, where any user inside the boundary was implicitly trusted by default, and anyone outside the boundary was denied access. Being connected to the private network was the only verifiable credential needed to access the system and all its data.
The importance of security training in the zero trust era


Momentum for zero trust migration is accelerating across the cybersecurity community. It was a fundamental component of the Biden Administration’s 2023 National Security Strategy. Nearly 90% of global organizations have already started implementing basic aspects of a zero trust security model. And in Forrester’s 2024 predictions report, analysts forecast that dedicated roles with “zero trust” in the title are expected to double over the next year.
This is because the need for zero trust authentication has never been clearer. Conventional network security approaches are increasingly vulnerable in today's cloud enterprise environment, where post-pandemic digital transformations, software supply chains, remote work models and bring-your-own-device policies have widened the attack surface. Cloud-based cyberattacks increased by nearly 50 percent in 2022. Meanwhile, more than 10 million people were impacted by supply chain attacks over the same year.
Enterprises need to adapt security measures to cope with changing threats


With cyber threats becoming increasingly sophisticated, organizations face new challenges in safeguarding their digital assets. A new report from Info-Tech Research Group looks at the issues IT and security leaders must prioritize over the coming year.
It highlights the need to take account of the cybersecurity talent shortage, the rise of AI-driven threats, the integration of security risks with business risks, the adoption of zero-trust frameworks, and the increasing significance of automating security operations.
Why identity is the cornerstone of a zero trust architecture


As organizations continue to embrace digital transformation to gain access to the cloud’s many benefits, this means that computing environments are evolving into borderless IT ecosystems. Digital identities are also evolving at pace and identity security is now a crucial aspect of cybersecurity.
As we continue to digitally transform organizations, so the importance of secure and reliable digital identities has grown. 2024 is poised to usher in a multitude of innovations and trends in this area, ranging from advanced biometrics to the integration of artificial intelligence and machine learning to meet the changing needs of businesses, individuals, and governments.
Sophisticated attacks, changing authentication and quantum threats -- cybersecurity predictions for 2024

Cybersecurity for SMEs: Seven steps to a Zero Trust approach


Never trust, verify everything! This is the premise on which the "Zero Trust" approach was founded. This model of cybersecurity involves implementing controls designed to ensure that only verified users can access company resources, and from similarly approved devices.
This strategy is increasingly being adopted in response to the challenges faced by small and medium-sized enterprises (SMEs), such as the continued evolution of hybrid working, the use of Bring Your Own Device (BYOD) and the increase and sophistication in cyber-attacks. Whereas previously SMEs thought they weren’t a target, now they are seen as the weaker link from a hackers’ perspective and increasingly they are falling victims to cyber attacks.
From The White House to your business: The countdown is on to zero trust


The countdown is on. Following orders by The White House, civilian government agencies have a little over a year to establish and implement zero trust cybersecurity. The threat environment is evolving too quickly, the government notes, to rely on outdated defenses.
And the public sector is already heeding the cybersecurity call. Roughly two-thirds of American government agencies are confident of meeting the zero trust requirement by the deadline of September 2024.
Technology is a powerful tool for mitigating increasing business costs


Given rising inflation and a gloomy economic outlook for many companies in the UK, optimizing expenditures and cutting costs is essential to ensure the business continues to function effectively. It is imperative to maintain competitive performance, and controlling costs is often a critical step in obtaining robust business operations alongside operational efficiency.
Adopting the appropriate technology can drastically reduce the time invested in labour-intensive tasks, minimise human mistakes, and guarantee that projects are brought to fruition effectively, enabling a business to do more with less. As a result, your business will be better equipped to perform more proficiently, reduce expenses, and strengthen communication with customers and employees.
You're not already using zero trust authentication? Why?


Despite their weaknesses, many organizations continue to rely on a fundamentally flawed traditional security approach that exposes their systems, their data, their users, and their customers to significant risk. Yes, I’m talking here about passwords.
While password practices may have remained a security staple over the decades, the proliferation of digital services offers rich pickings for cybercriminals. Using various methods to gain access to digital accounts, cyber criminals typically target passwords to conduct an attack or account takeover. That’s because passwords are easy to steal and share.
Threat landscape is getting worse say CISOs


A new study of over 200 CISOs and senior security leaders at organizations with over 5,000 employees shows that 93 percent have suffered at least one cyberattack in the last year and all of them think the security landscape is worsening.
The research from Censys also shows that 53 percent identify the need to secure their organization's entire attack surface as their top priority.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.