Home » Zero Trust security

Zero Trust security

The Zero Trust Security Framework Explained: What it Means to Your Organization

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Forbes Cloud 100 Leader Rubrik Protects Your Data from Ransomware Attacks with Zero Trust Approach

Sourced from Kaspersky With data being increasingly valuable to a company’s organisations, ransomware attacks are surging around the world, including in South Africa. It is becoming incredibly lucrative for attackers to target businesses for their data, and at the same time, the ransomware being used is becoming more sophisticated. This means that more enterprises will feel the need to pay the ransom in the case of a breach. So says Risna Steenkamp, General Manager: ESM Division at Networks Unlimited, which distributes Rubrik solutions throughout Africa. “It is unfortunate,” she explains, “that in the event of a breach, paying the ransom is no guarantee that the threat actors will actually honour the agreement and release the data. This potentially leaves a breached organisation in the une...

Why People Should Invest in a Culture of Zero Trust Security

Sourced from International IDEA During a preview of this year’s RSA conference, a team from Orange Cyberdefense demonstrated a range of pretty scary scenarios of what can happen when malicious actors take control over a user’s home router. These range from duping users into downloading payloads dressed up as fake VPN software updates, capturing user’s credentials or redirecting traffic that should be going over the VPN to the threat actor. Typically, home routers are outside of the enterprise security control and often not very well protected. The majority of people trust their ISP to set up their home access points for them, frequently resulting in default settings such as admin/admin credentials. Home routers are frequently attacked by criminal and state actors alike. Despite the easing ...