Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Partner Summit 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM Newsroom Ingram Micro ONE 2019 News Juniper NXTWORK 2019 News Lenovo Newsroom Lexmark Newsroom NetApp Insight 2019 News Cisco Live Newsroom HPE Zone Intel Tech Provider Zone

Black Hat 2018: 12 Executives On The Most Overhyped Cybersecurity Trends Today

CRN asked 12 executives and technical leaders attending Black Hat 2018 what cybersecurity concepts seem to be more about buzzwords than delivering meaningful protection.

Back 1 ... 8   9   10   11   12   ... 13 Next

Zero Trust

A lack of understanding exists around what Zero Trust security means, what it looks like from a consumer perspective, and what organizations looking to adopt such an approach should be looking for from vendors and solution providers, according to Jonathan Goldberger, Vice President and General Manager of Unisys Security.

As the perimeter dissolves, Goldberger said organizations need to find a new approach to security. But too many vendors simple discuss the need for Zero Trust security and then attach their offering to the buzzword, Goldberger said, without describing how their product truly does away the idea of a trusted network inside a defined corporate perimeter.

For starters, Goldberger said products promoting a Zero Trust approach should have additional levels of identity verification beyond user ID and password. From there, Goldberger said consumers should push vendors to detail the tangible outcome of their Zero Trust approach such as less phishing activity or faster time to detection and response.

Back 1 ... 8   9   10   11   12   ... 13 Next

sponsored resources