News

ZTNA is an important step on the zero-trust journey, but it’s not the destination. Failing to secure your applications ...
Cybersecurity company Zscaler is championing a 'zero trust' security model to combat evolving cyber threats in the cloud-first era, as highlighted by CEO Jay Chaudhry at Zenith Live 2025. This ...
Swiss-licensed crypto wallet Relai has integrated biometric authentication from Keyless for logins, account recovery and ...
Trust in modern cybersecurity, especially in access control and communication, has morphed from a status to continuous verification. This transition, captured in a security model known as zero trust, ...
Learn more about zero-knowledge proofs (ZKPs), how they work, why they matter for cryptocurrency and CBDCs, and what the potential pitfalls are.
By Tracy Burrows for Liquid C2 & CloudflareJohannesburg, 24 Jun 2025Amrit Toor, Solutions Architect at Cloudflare. While many organisations are still challenged in achieving zero trust, the principles ...
A zero-trust network ensures the integrity of security data that increasingly informs business decisions, from retail analytics to workplace optimization.
Zero Trust unlocks the data integrity and confidence that delivers the promise of AI to electronic and physical security systems.
Zero Trust microsegmentation promises a future where workloads are isolated, blast radii are minimized, and least-privilege access is enforced by default. It’s a critical milestone on the path to ...
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing ...