Zscaler's SVP and GM Product Management, Dhawal Sharma, sat down with me in an interview at Zenith Live in Las Vegas to discuss his opinion on ‘Zero Trust’.
Sharma shared insights about the evolution of zero trust architecture and the future of VPNs. There are many challenges, misconceptions, and practical applications of zero trust, along with the potential obsolescence of traditional VPN solutions.
Sharma spoke about two main areas of focus in his keynote presentation at Zenith Live. The first addressed platform innovations and the evolution of Zscaler's platform, while the second delved into the innovations in the zero trust networking stack. He revealed significant developments in private access ...
The Voice of Cyber®
Zero Trust
Zero Trust is a cybersecurity framework that challenges the traditional perimeter-based security model by assuming that threats can originate from both external and internal sources. In a Zero Trust model, trust is never assumed, and strict access controls are implemented regardless of the user’s location, network, or device. The core principle of Zero Trust is to verify and authenticate every user, device, or application trying to access a network, even if they are already inside the organization’s perimeter.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an ...
Jason du Preez, Vice President of Privacy and Security at Informatica, comments on why the companies that collect our data have the power and the responsibility to take ...
We’ve all heard the mantra that ‘humans are the weakest link’ in any organisation’s cybersecurity defences, but with generative AI technology making exploits such as phishing ...
My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?
BeyondTrust experts forecast future threat vectors most likely to affect organizsations worldwide in the New Year. Top cybersecurity threats include the evolution of the AI ...
The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there.
In The News
Sort By
- Date
- Title
G2, a customer-driven software review platform, named Absolute Security as a leader in its Spring Grid Reports for Zero Trust Networking and Endpoint Security. Absolute has ...
ManageEngine combats ransomware attacks and identity theft with its latest launch of FIDO2 authentication in its on-premises identity security solution.
The company also ...
The global cybersecurity leader has become the future stadium’s new partner for the next three seasons, until 30 June 2028.
• New open Platform optimizes digital experiences by leveraging full-fidelity data and AI to automate prevention, identification, and resolution of IT issues • New ...
Kyndryl, the world’s largest IT infrastructure services provider, today announced a global strategic alliance and new Kyndryl services with Rubrik the Zero Trust Data ...
Prisma SASE 3.0 extends Zero Trust to unmanaged devices, secures data with AI, and boosts application performance for partners and customers