Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zero Trust

Securing AI

With the proliferation of AI/ML enabled technologies to deliver business value, the need to protect data privacy and secure AI/ML applications from security risks is paramount. An AI governance framework model like the NIST AI RMF to enable business innovation and manage risk is just as important as adopting guidelines to secure AI. Responsible AI starts with securing AI by design and securing AI with Zero Trust architecture principles.

Netskope Cloud Exchange for Your Zero Trust Journey

Early in 2023 my colleague, and VP of Technology Integrations and Business Development, David Willis walked us through Realizing the True Power of Netskope Cloud Exchange. In the article, David painted the evolution of Cloud Exchange with a focus on how the Netskope Cloud Threat Exchange (CTE) module has matured since it was released.

Netskope One & The Zero Trust Engine

The Netskope Zero Trust Engine is at the center of the Netskope One platform, which ensures continuous adaptive trust-based policy controls extend effortlessly and consistently across Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Zero Trust Network Access (ZTNA), Cloud Firewall (FWaaS), and Software Defined WAN (SD-WAN) services, leaving no security gaps and delivering an exceptional user experience.

Securing Cloudflare with Cloudflare: a Zero Trust journey

Cloudflare is committed to providing our customers with industry-leading network security solutions. At the same time, we recognize that establishing robust security measures involves identifying potential threats by using processes that may involve scrutinizing sensitive or personal data, which in turn can pose a risk to privacy. As a result, we work hard to balance privacy and security by building privacy-first security solutions that we offer to our customers and use for our own network.

Why Machine Identities Are Essential Strands in Your Zero Trust Strategy

Just like a snagged strand can ruin your garment, overlooking the security of machine identities can tear the very fabric of Zero Trust that protects your organization from bad actors. As a quick refresher, Zero Trust operates on the principle that no entity inside or outside the network perimeter is trusted by default. As we usher in an era where the traditional network perimeter has dissolved due to cloud services, remote work and mobile access, the necessity for Zero Trust becomes even more pronounced.

11:11 Systems Secures 2023 Zero Trust Security Excellence Award

The Roman philosopher Seneca once said, “Luck is what happens when preparation meets opportunity.” In Vegas, when you are on a roll, you are on a roll. To beat the odds, you must be smart and disciplined. Whether winning big at the tables or championships on the basketball court, there is no better feeling. Often athletes are asked what it means to win and they often don’t have the words to describe it. Winning, regardless of the endeavor, almost always is a team effort.

AlgoSec and Zero-Trust for Healthcare

Before I became a Sale Engineer I started my career working in operations and I don’t remember the first time I heard the term zero trust but I all I knew is that it was very important and everyone was striving to get to that level of security. Today I’ll get into how AlgoSec can help achieve those goals, but first let’s have a quick recap on what zero trust is in the first place.