* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Tuesday, October 7, 2025
Earth-News
  • Home
  • Business
  • Entertainment
    Row K Entertainment Emerges as Major New Hollywood Buyer With Splashy TIFF Shopping Spree – TheWrap

    Row K Entertainment Emerges as Major New Hollywood Buyer With Splashy TIFF Shopping Spree – TheWrap

    Charlie Hunnam Reflects on Playing a Serial Killer in Monster: The Ed Gein Story – Yahoo

    Charlie Hunnam Reveals the Dark Challenges of Playing a Serial Killer in Monster: The Ed Gein Story

    “Reba” cast, then and now: See the stars 24 years later (and who’s reunited for another show) – Yahoo

    “Reba” cast, then and now: See the stars 24 years later (and who’s reunited for another show) – Yahoo

    Why Taylor Swift Name-Dropped Elizabeth Taylor in Her New Album – Yahoo

    Here’s Why Taylor Swift Dropped Elizabeth Taylor’s Name in Her New Album

    Al Roker Gives Olivia Dean an Unexpected ‘New Job’ on the ‘Today’ Show – Yahoo

    Al Roker Shocks Olivia Dean with an Exciting New Role on the ‘Today’ Show

    Books about the arts and some haunts for a Denton October – Denton Record-Chronicle

    Uncover Artistic Treasures and Spooky Adventures to Experience in Denton This October

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Is Light-Speed Analog Computing the Future of Technology? – BIOENGINEER.ORG

    Could Light-Speed Analog Computing Transform the Future of Technology?

    ARM Institute opens technology project call to speed submarine manufacturing – The Robot Report

    ARM Institute Unveils Cutting-Edge Technology Project to Revolutionize Submarine Manufacturing

    Forget Cowbells. Cows Wear High-Tech Collars Now. – The New York Times

    Ditch the Cowbells: Discover the High-Tech Collars Transforming Cattle Care

    What the Recent Price Surge Means for Figure Technology Solutions After SEC Settlement – Yahoo Finance

    What the Recent Price Surge Reveals About Figure Technology Solutions Following SEC Settlement

    MAC Brings iPad Technology to Football Sidelines Across All 13 Member Schools – Sports Video Group

    MAC Brings iPad Technology to Football Sidelines Across All 13 Member Schools – Sports Video Group

    Technology Is Becoming More Important Than Humans In CX – No Jitter

    Technology Is Becoming More Important Than Humans In CX – No Jitter

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    Row K Entertainment Emerges as Major New Hollywood Buyer With Splashy TIFF Shopping Spree – TheWrap

    Row K Entertainment Emerges as Major New Hollywood Buyer With Splashy TIFF Shopping Spree – TheWrap

    Charlie Hunnam Reflects on Playing a Serial Killer in Monster: The Ed Gein Story – Yahoo

    Charlie Hunnam Reveals the Dark Challenges of Playing a Serial Killer in Monster: The Ed Gein Story

    “Reba” cast, then and now: See the stars 24 years later (and who’s reunited for another show) – Yahoo

    “Reba” cast, then and now: See the stars 24 years later (and who’s reunited for another show) – Yahoo

    Why Taylor Swift Name-Dropped Elizabeth Taylor in Her New Album – Yahoo

    Here’s Why Taylor Swift Dropped Elizabeth Taylor’s Name in Her New Album

    Al Roker Gives Olivia Dean an Unexpected ‘New Job’ on the ‘Today’ Show – Yahoo

    Al Roker Shocks Olivia Dean with an Exciting New Role on the ‘Today’ Show

    Books about the arts and some haunts for a Denton October – Denton Record-Chronicle

    Uncover Artistic Treasures and Spooky Adventures to Experience in Denton This October

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Is Light-Speed Analog Computing the Future of Technology? – BIOENGINEER.ORG

    Could Light-Speed Analog Computing Transform the Future of Technology?

    ARM Institute opens technology project call to speed submarine manufacturing – The Robot Report

    ARM Institute Unveils Cutting-Edge Technology Project to Revolutionize Submarine Manufacturing

    Forget Cowbells. Cows Wear High-Tech Collars Now. – The New York Times

    Ditch the Cowbells: Discover the High-Tech Collars Transforming Cattle Care

    What the Recent Price Surge Means for Figure Technology Solutions After SEC Settlement – Yahoo Finance

    What the Recent Price Surge Reveals About Figure Technology Solutions Following SEC Settlement

    MAC Brings iPad Technology to Football Sidelines Across All 13 Member Schools – Sports Video Group

    MAC Brings iPad Technology to Football Sidelines Across All 13 Member Schools – Sports Video Group

    Technology Is Becoming More Important Than Humans In CX – No Jitter

    Technology Is Becoming More Important Than Humans In CX – No Jitter

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Technology

Why CISOs need zero trust as a ransomware shield

September 19, 2023
in Technology
Why CISOs need zero trust as a ransomware shield
Share on FacebookShare on Twitter

September 18, 2023 3:30 PM

Zero Trust Network and Zero Trust Architecture - ZTA - Extended Detection and Response Platform - Conceptual Illustration

Image Credit: Getty Images

Head over to our on-demand library to view sessions from VB Transform 2023. Register Here

This year is on pace to be the second-costliest for ransomware attacks ever, with threat actors relying on new deceptive approaches to social engineering combined with weaponized AI. The recent MGM breach began with attackers studying the social media profiles of help desk employees, then calling the help desk and impersonating them to get privileged access credentials and logins.

Zero trust security needs to be a mindset that pervades everything from consolidating tech stacks to managing identities at scale. CISOs and their teams must start with the assumption that a breach has already happened, and an organization’s network needs to be designed to limit an intrusion’s blast radius and depth.

“Zero trust requires protection everywhere — and that means ensuring some of the biggest vulnerabilities like endpoints and cloud environments are automatically and always protected,” said Kapil Raina, VP of zero trust marketing and evangelist for identity, cloud and observability) at CrowdStrike. “Since most threats will enter into an enterprise environment either via the endpoint or a workload, protection must start there and then mature to protect the rest of the IT stack.”

Gartner introduces a new Hype Cycle for Zero Trust Networking

Gartner’s inaugural Hype Cycle for Zero Trust Networking comes at a time when CISOs and the organizations they serve are under siege from near-record ransomware attacks. All hype cycles and market frameworks have limitations, yet they do help to filter out vendor noise and those overstating their zero trust capabilities. The Hype Cycle examines 19 key technologies — including microsegmentation, Kubernetes networking, secure access service edge (SASE) and security service edge (SSE) — and maps their maturity level and hype cycle position. 

Event

VB Transform 2023 On-Demand

Did you miss a session from VB Transform 2023? Register to access the on-demand library for all of our featured sessions.

Register Now

VentureBeat believes that ten core technologies in the Hype Cycle have the potential to deliver the most value to CISOs. They include container security, enterprise browsers, Kubernetes networking, managed SASE, microsegmentation, OpenID Connect, remote browser isolation (RBI), security service edge (SSE), unified endpoint security and zero trust strategy.

 Source: Gartner, Hype Cycle for Zero Trust Networking

What is zero trust networking?

Gartner defines zero trust networking (ZTN) as how zero trust concepts are applied and integrated into network infrastructure. Consistent with the NIST zero trust security standard, ZTN only grants users and devices access to a network based on real-time identity and context validation. An enterprise-class ZTN infrastructure grants access to authenticated and authorized identities and adheres to least-privileged access to any network resource.

CISOs tell VentureBeat that the more progress their organizations make in implementing Zero Trust Network Access (ZTNA), the more efficient ZTN becomes to implement. The goal is to secure virtual teams and scale up new digital transformation projects so they aren’t hacked right after launch. New apps are an attack magnet, and ZTNA is helping reduce threat surfaces and protect against privileged access credential theft while strengthening risk-based dynamic access control policies.

Ten zero trust technologies worth watching  

Defining a zero trust security strategy that delivers quick wins is essential to control budgets and gain greater investment. One CISO told VentureBeat that they schedule quick, measurable wins early in their zero trust roadmaps expressly for that purpose. Today’s CISOs are looking to protect and grow budgets to invest in new technologies. 

VentureBeat identifies the ten core technologies below as delivering the greatest value to CISOs pursuing zero trust strategies.

Container security

Developer container security tools detect vulnerabilities and misconfigurations early. These production tools protect against exposed containers and compromised images at runtime. Network segmentation and runtime behavior monitoring secure dynamic container environments. Leading vendors include Aqua Security, Orca Security, Red Hat, Sysdig, Trend Micro and Palo Alto Networks.

Enterprise browsers

Managed, secure browsers consolidate access to reduce the risk of malicious sites or downloads. Secure web browsing is becoming more popular among dispersed workforces. Granular policy control over web content, downloads and extensions is essential. Check Point Software, Ermes Cyber Security, Google, Island, Microsoft, Perception Point, Seraphic Security, SlashNext, SURF and Talon Cyber Security are among the leading vendors.

Kubernetes networking

Kubernetes networking addresses Kubernetes’ requirements for scale, security and visibility. Load balancing, service discovery, multi-cluster connectivity and microsegmentation are all key features. Among the top vendors are Amazon Web Services, Avesha, Azure, Cisco, F5, HashiCorp, Isovalent, Juniper Networks, Tetrate and VMware.

Managed SASE

Managed SASE accelerates deployments with integrated networking and security as a service using providers’ resources and expertise. Key benefits include reduced staffing risks, quicker enablement of SASE capabilities and integrated management. VentureBeat continues to see SASE benefiting from the faster consolidation of networking and security. AT&T, Cato Networks, Comcast, Expereo, KDDI, MetTel, Orange Business Services, Palo Alto Networks, Verizon, VMware and Windstream Enterprise are leading SASE vendors.

Microsegmentation

Microsegmentation is core to the NIST SP800-207 zero trust standard and provides many benefits, including enforcing identity-based access policies between workloads to limit lateral movement after breaches. It also provides granular controls over east-west traffic based on workload identity, not just network zoning. Leading vendors include Airgap Networks, Akamai Technologies, Cisco, ColorTokens, Fortinet, Illumio, Palo Alto Networks, VMware, Zero Networks and Zscaler.

OpenID Connect

OpenID Connect is an authentication protocol that improves user experience, security and privacy. It is gaining adoption to enable single sign-on across devices, apps and APIs. Leading vendors include Auth0, Cloudentity, Curity, ForgeRock, Gluu, Google, IBM, Microsoft, Okta, Ping Identity and Red Hat.

Remote Browser Isolation (RBI)

RBI isolates browsers to reduce the attack surface by remotely executing web code, thwarting threats such as drive-by downloads, phishing and data exfiltration. Leading vendors are focusing their innovation on improving isolation techniques and integrating with Secure Web Gateway (SWG) and ZTNA to address more use cases.

Granular upload/download controls and integrations with Cloud Access Security Brokcers (CASB), data loss prevention (DLP) and sandboxes have been added to analyze threats detected during isolated browsing sessions. Leading vendors include Authentic8, Broadcom, Cloudflare, Cradlepoint (Ericom), Forcepoint, Garrison, Menlo Security, Netskope, Proofpoint, Skyhigh Security and Zscaler.

Security Service Edge (SSE)

SSE consolidates SWG, CASB and ZTNA into a cloud platform to secure web, SaaS and private apps while ensuring that system-wide management stays consistent and at scale. Tight integration enables standardized policies, automated workflows and data sharing across integrated tools. SSE also improves remote user experiences through unified architecture. SSE boosts efficiency and consistency by streamlining administration and coordination between security technologies. Leading vendors include Broadcom, Cisco, Cloudflare, Forcepoint, Fortinet, iboss, Lookout, Netskope, Palo Alto Networks, Skyhigh Security and Zscaler.

Unified Endpoint Security (UES)

UES combines endpoint protection and management to enable risk-aware security policies and automated remediation. It enables risk-based patching prioritization and continuous vetting of endpoint configurations for more effective security posture management by integrating real-time telemetry threat data into operations workflows. Leading vendors include Absolute, BlackBerry, CrowdStrike, IBM, Ivanti, Microsoft, Sophos, Syxsense, Tanium and VMware.

Zero trust strategy

A zero trust strategy establishes the fundamentals and activities of a zero trust program. It enforces least privileged access for every resource and identity request. It reduces the blast radius of intrusions and breaches. Strategies must align with enterprise objectives and risk tolerance. For zero trust strategies to be effective, they must be customized for each organization.

The following table summarizes the ten zero trust technologies worth watching based on VentureBeat interviews with CISOs.  

Predicting the future of zero trust

The massive MGM ransomware attack that began with a simple phone call illustrates how critical it is to have identity-based security and microsegmentation, hardened with real-time validation of credentials, to limit the blast radius. Zero trust assumes a breach has already happened and serves as a framework to contain it.

Zero trust is no panacea against attackers using generative AI to sharpen their tradecraft and launch social engineering-based attacks that devastate victims. As one CISO recently told VentureBeat: “Zero trust needs to deliver resilience. That’s its business case, and the more resilient and capable it is of limiting an attack, the more zero trust proves its value as a business decision.” 

VentureBeat’s mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : VentureBeat – https://venturebeat.com/security/why-cisos-need-zero-trust-as-a-ransomware-shield/

Tags: CISOsRansomwaretechnology
Previous Post

Dave the Diver’s director on the breakout indie hit of 2023

Next Post

This week in data: Decrypting the generative AI mania

Learned use of an innate sound-meaning association in birds – Nature

How Birds Harness Innate Sound-Meaning Connections Through Learning

October 7, 2025
This Ancient Statue Was Discarded by Raiders. Scientists Think It’s a Rare Treasure. – Popular Mechanics

Forgotten by Raiders, This Ancient Statue Could Be a Priceless Treasure

October 7, 2025
Scientists used AI to map uncharted areas of the mouse brain – Live Science

Scientists Harness AI to Uncover Hidden Regions of the Mouse Brain

October 7, 2025
Pets of the Day: Sweep the clouds away with Zoe, Telly and Elmo – Yahoo

Meet Zoe, Telly, and Elmo: Your Daily Dose of Sunshine and Smiles

October 7, 2025
Is Light-Speed Analog Computing the Future of Technology? – BIOENGINEER.ORG

Could Light-Speed Analog Computing Transform the Future of Technology?

October 7, 2025
Frustrations grow around Bill Belichick and North Carolina after team’s porous start to the 2025 season – Yahoo Sports

Frustrations grow around Bill Belichick and North Carolina after team’s porous start to the 2025 season – Yahoo Sports

October 7, 2025
Jason Anderson Signs for Suzuki for 2026 SMX World Championship – Monster Energy AMA Supercross

Jason Anderson Signs for Suzuki for 2026 SMX World Championship – Monster Energy AMA Supercross

October 7, 2025
Downtown St. Paul’s economy showing new life after state employees mandated to return to office – 5 EYEWITNESS NEWS

Downtown St. Paul Thrives Again as State Employees Return to the Office

October 7, 2025
No, Anthony Boyle Didn’t Use a Prosthetic in His House of Guinness Bath Scene – Yahoo

Anthony Boyle Opens Up About the Shocking Truth Behind His House of Gucci Bath Scene

October 7, 2025
Ozzy Osbourne documentary reveals agonizing health struggles of his final years – USA Today

Inside Ozzy Osbourne’s Heartbreaking Battle with Health in His Final Years

October 7, 2025

Categories

Archives

October 2025
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  
« Sep    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (856)
  • Economy (876)
  • Entertainment (21,749)
  • General (17,463)
  • Health (9,918)
  • Lifestyle (889)
  • News (22,149)
  • People (878)
  • Politics (887)
  • Science (16,087)
  • Sports (21,377)
  • Technology (15,857)
  • World (859)

Recent News

Learned use of an innate sound-meaning association in birds – Nature

How Birds Harness Innate Sound-Meaning Connections Through Learning

October 7, 2025
This Ancient Statue Was Discarded by Raiders. Scientists Think It’s a Rare Treasure. – Popular Mechanics

Forgotten by Raiders, This Ancient Statue Could Be a Priceless Treasure

October 7, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version