Articles tagged with: #zero-trust Clear filter
How important is device posture in BYOD?

How important is device posture in BYOD?

cybersecurity www.reddit.com

Hey yall, I've been tasked with setting up a zero trust solution to our contractors, there's a BYOD situation there with some internal apps on our side. I've heard good and bad things about Island, but I was also considering something simpler like Zscaler third party access or Menlo which to my understanding don't require an agent or any installation. But in that case I guess that they don't cover device posture.. Should that be a deal breaker? Appreciate any input here, thanks! submitted by...

Siemens just released a platform to bring Zero Trust networking to industrial environments

Siemens just released a platform to bring Zero Trust networking to industrial environments

cybersecurity www.reddit.com

Came across this press release, thought others may find it interesting. TL:DR, Siemens released SINEC Secure Connect for managing communication connections in OT networks, which virtualizes network structures and protects shop floor devices from targeted attacks and unauthorized access. It supports several use cases and architectures, including Machine-to-Machine, Machine-to-Cloud, and Machine-to-Datacenter connections, plus secure remote access to industrial systems - all without traditional...

Zero Trust-based Decentralized Identity Management System for Autonomous Vehicles

Zero Trust-based Decentralized Identity Management System for Autonomous Vehicles

cs.CR updates on arXiv.org arxiv.org

arXiv:2509.25566v1 Announce Type: new Abstract: The rise of autonomous vehicles (AVs) promises to significantly enhance transportation safety and efficiency by mitigating human error, which is responsible for over 90\% of road accidents. However, the increasing connectivity of AVs introduces new cybersecurity challenges, as traditional perimeter-based security models are inadequate for dynamic and untrusted environments. This paper presents a novel Zero Trust-based Decentralized Identity...

Security Friction Quotient for Zero Trust Identity Policy with Empirical Validation

Security Friction Quotient for Zero Trust Identity Policy with Empirical Validation

cs.CR updates on arXiv.org arxiv.org

arXiv:2509.22663v1 Announce Type: new Abstract: We define a practical method to quantify the trade-off between security and operational friction in modern identity-centric programs. We introduce the Security Friction Quotient (SFQ), a bounded composite index that combines a residual-risk estimator with empirically grounded friction terms (latency, failure rate, and helpdesk impact). We establish clarity properties (boundedness, monotonic response, and weight identifiability) with short proofs,...

New paradigm proposal: "Security by Non-Functioning through Quantum-Hybrid Randomized Superpositional Unavailability"

New paradigm proposal: "Security by Non-Functioning through Quantum-Hybrid Randomized Superpositional Unavailability"

cybersecurity www.reddit.com

I've been exploring alternative paradigms to traditional "security by design" and "zero trust." With the rise of quantum computing and post-quantum resilience requirements, it's clear that constant availability may no longer be a sustainable assumption. This draft introduces Security by Non-Functioning through Quantum-Hybrid Randomized Superpositional Unavailability (QSU). • System availability exists in a superpositional state (functioning and non-functioning) until explicitly inspected. •...

How John Kindervag got the last laugh on zero trust

How John Kindervag got the last laugh on zero trust

cybersecurity www.reddit.com

While zero trust is championed within the cybersecurity industry today, Kindervag said he was met with a tough crowd when his report on the concept was published in 2010. "The first reactions to zero trust were, 'That's a dumb idea. You're an idiot. It's never going anywhere. Why'd you write this report?'" Kindervag said. submitted by /u/BrooklynShatterDome [link] [comments]

Practical cyber awareness for the GenAI era: out-of-band verification + a one-page AI policy

Practical cyber awareness for the GenAI era: out-of-band verification + a one-page AI policy

cybersecurity www.reddit.com

We're seeing more "perfect" messages - native idioms, brand-matched PDFs, even convincing voice calls. Shiny tools help, but the core is Zero Trust habits: assume channels are compromised; verify identity and authorization every time. Key ideas I'm proposing: Trust no channel; verify every request. For any money move, access change, or data exfil risk: do out-of-band verification using a known number/video/passphrase or signed approval. Make this muscle memory. A one-page AI usage policy anyone...

B5GRoam: A Zero Trust Framework for Secure and Efficient On-Chain B5G Roaming

B5GRoam: A Zero Trust Framework for Secure and Efficient On-Chain B5G Roaming

cs.CR updates on arXiv.org arxiv.org

arXiv:2509.16390v1 Announce Type: new Abstract: Roaming settlement in 5G and beyond networks demands secure, efficient, and trustworthy mechanisms for billing reconciliation between mobile operators. While blockchain promises decentralization and auditability, existing solutions suffer from critical limitations-namely, data privacy risks, assumptions of mutual trust, and scalability bottlenecks. To address these challenges, we present B5GRoam, a novel on-chain and zero-trust framework for...

Versa Announces New Integrations with CrowdStrike Falcon Platform

Versa Announces New Integrations with CrowdStrike Falcon Platform

Cyber Security - AI-Tech Park ai-techpark.com

Integrations Unite Endpoint and Network Data to Enhance Zero Trust Access and Accelerate SOC Response Versa, the global leader in Universal Secure Access Service Edge (SASE), today announced new integrations with the CrowdStrike Falcon(R) platform at Fal.Con 2025. Now available in the CrowdStrike Marketplace, the integrations - including support for...

Anyone running Zero Trust in the cloud without it becoming a mess?

Anyone running Zero Trust in the cloud without it becoming a mess?

cybersecurity www.reddit.com

Every vendor pitches "Zero Trust everywhere" like it's easy. Reality for us: IAM sprawl, too many service accounts, and conditional access policies that feel like duct tape. We're multi-cloud (AWS + GCP) and trying to align with NIST Zero Trust principles, but enforcing least privilege without breaking stuff has been brutal. Anyone got a cloud-native setup they trust that doesn't devolve into constant exceptions? submitted by /u/Zaughtilo [link] [comments]

Dispersive Integrates with CrowdStrike Falcon to Boost Security Access

Dispersive Integrates with CrowdStrike Falcon to Boost Security Access

Cyber Security - AI-Tech Park ai-techpark.com

Fal.Con 2025 - Dispersive Holdings, Inc. (Dispersive(R)), the leader in stealth networking for secure and resilient communications, today at Fal.Con 2025 announced a new integration with the AI-native CrowdStrike Falcon(R) platform. The joint solution unifies endpoint, identity, and network context to help customers contain threats faster, strengthen zero trust security, and reduce complexity. The...

Zero trust is the most abused term in security right now

Zero trust is the most abused term in security right now

cybersecurity www.reddit.com

Every vendor slaps zero trust on their product like its a magic shield. But actually implementing it is horror. Identity layers, device checks, least privilege, micro segmentation never ending process. We are halfway in, but the cultural change is harder than the tech. how true is end to end zero trust implementation? submitted by /u/Soft_Attention3649 [link] [comments]

[Advice] Confused about what to focus on next  -  Security Engineering vs Malware Analysis?

[Advice] Confused about what to focus on next - Security Engineering vs Malware Analysis?

For [Blue|Purple] Teams in Cyber Defence www.reddit.com

I'm currently working as a Cybersecurity Analyst Intern where I'm getting a lot of hands-on exposure with logs, detections, and developing an analyst mindset. I'll be graduating in ~6 months and moving into full-time work, but I'm a bit stuck on what direction to double down on next. I see two clear paths: Security Engineering / Infra side - I love Linux, cloud, and self-hosting. I've built a homelab (Proxmox, Linux/Windows VMs, Pi-hole, Nextcloud, Cloudflare Zero Trust, etc.), and I enjoy...

Xage Security Launches Unified Zero Trust Platform for AI Systems

Xage Security Launches Unified Zero Trust Platform for AI Systems

Cyber Security - AI-Tech Park ai-techpark.com

Xage Security, a global leader in Zero Trust access and protection, today announced a first-of-its-kind unified Zero Trust platform designed to secure AI environments. Built on the same proven Zero Trust principles Xage uses to protect the world's most critical infrastructure, the platform delivers granular, reliable, and enforceable control over AI data...

EFPIX: A zero-trust encrypted flood protocol

EFPIX: A zero-trust encrypted flood protocol

cs.CR updates on arXiv.org arxiv.org

arXiv:2509.08248v1 Announce Type: new Abstract: We propose a flood-based relay communication protocol that achieves end-to-end encryption, plausible deniability for users, and untraceable messages. It is resistant to changes in topology and infrastructure failures. It is also designed to hide metadata, such as sender and receiver, from those not involved.