Jason du Preez, Vice President of Privacy and Security at Informatica, comments on why the companies that collect our data have the power and the responsibility to take control of data and use it for the common good.
The Voice of Cyber®
Zero Trust
Zero Trust is a cybersecurity framework that challenges the traditional perimeter-based security model by assuming that threats can originate from both external and internal sources. In a Zero Trust model, trust is never assumed, and strict access controls are implemented regardless of the user’s location, network, or device. The core principle of Zero Trust is to verify and authenticate every user, device, or application trying to access a network, even if they are already inside the organization’s perimeter.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Ask a group of IT security professionals to give their opinion on zero trust and you’re likely to receive a range of different responses. Some see it as little more than the ...
Zscaler, Inc. (NASDAQ:
ZS), the leader in cloud security, found that more than 90% of IT leaders who have started their migration to the cloud have implemented, are ...
Rubrik, the Zero Trust Data Security™ Company, today announced the Australian findings from its inaugural State of Data Security report, commissioned by Rubrik and conducted ...
In The News
Sort By
- Date
- Title
ExtraHop customers can now store records in LogScale, enabling greater flexibility and streamlining network data analysis
Sydney, 16 January 2024 - Ping Identity, a leading provider of seamless and secure digital experiences, released its annual survey which evaluates Australian consumer ...
January 15th - Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, announced today that it has been positioned as a Leader in the 2023 Gartner® Magic ...
SYDNEY, January 10, 2023 – As production lines become increasingly reliant on interconnected computer systems, the risk of cybercriminal exploitation looms large.
Nozomi ...
H-E Parts will deploy Fortinet’s secure networking, next-generation firewall, secure remote access with universal secure access service edge, and security analytics solutions ...
Ranked as a Leader: Check Point received the highest ranking in the Market Presence category, and the highest possible score in 13 criteria, including: data security, device ...
Podcasts On Zero Trust
No results found.