<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2092100&amp;fmt=gif">
    Browse by topic
    Subscribe to our news

    News

    Zentera 藉助 CoIP創新平台,輕易破解零信任實作障礙

    本文為重新發布的內容,原文刊登於 CIO Taiwan。了解 Zentera 的 CoIP 創新平台如何簡化 Zero Trust 的實施,提高雲端和本地環境中業務應用程式的安全性。在 CIO Taiwan 官網閱讀原文 : Zentera 藉助 CoIP創新平台,輕易破解零信任實作障礙 This article is reposted with permission from CIO Taiwan. Read the original article on CIO Taiwan.
    Read

    Zero Trust

    What is a Zero Trust DMZ for OT?

    Last Updated: July 11, 2024 This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. What is a network DMZ? A demilitarized zone, or "DMZ", is one of the workhorses of network security ...
    Read

    ZTNA

    A Guide to the NIST Zero Trust Architecture

    This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. Have you been searching for a more formal definition of Zero Trust? Look no further, NIST has you covered with Special Publication ...
    Read

    Zero Trust

    Zero Trust is Boring (and Why That's a Good Thing)

    When you hear the word "cybersecurity," what comes to mind? For many people, including myself, it conjures up images similar to the intense, high-stakes world portrayed in the American TV series, 24. In this show, a team of counter-terrorism experts ...
    Read

    Zero Trust

    What is an Application Network?

    This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. Modern enterprise applications run in an increasingly complex environment. Applications and data have increasingly moved beyond ...
    Read

    Zero Trust

    Authentication and Authorization for Zero Trust

    This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. Zero Trust security is a powerful paradigm that can help protect resources against malicious attacks, even if the attacker has ...
    Read

    Insider

    How To Prevent Software Supply Chain Attacks

    A new NIST specification promises to help software vendors avoid becoming conduits for advanced cyberattacks on their customers - and Zero Trust is part of the solution. The Infosec world was on fire again last week, and this time, the focus was on ...
    Read

    Insider

    Zero Trust Unveiled: 5 Common Myths

    Zero Trust is one of the most frequently discussed topics in cybersecurity, but it’s also one of the most misunderstood. It’s not because there’s not enough information out there - on the contrary, there is way too much written about Zero Trust! The ...
    Read

    Insider

    Navigating AI Cybersecurity Challenges

    Artificial intelligence (AI) exploded on the scene last summer with the launch of text-to-image AI like Stable Diffusion, and large language models, like GPT-3 from OpenAI. GPT-3 (which has already been succeeded by GPT-4) came into its own in ...
    Read

    Insider

    How the Secret Service Handles Zero Trust

    There's a popular phrase among devotees of the Perl programming language: "There's More Than One Way To Do It." (TMTOWTDI) This phrase neatly captures the ethos of Perl, which is to free programmers from the confines of syntaxes and algorithms, ...
    Read

    Stay Connected

    Sign up for our newsletter and to be notified of product, solution, and company news.