Articles tagged with: #zero-trust Clear filter
ZTFed-MAS2S: A Zero-Trust Federated Learning Framework with Verifiable Privacy and Trust-Aware Aggregation for Wind Power Data Imputation

ZTFed-MAS2S: A Zero-Trust Federated Learning Framework with Verifiable Privacy and Trust-Aware Aggregation for Wind Power Data Imputation

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.18318v1 Announce Type: cross Abstract: Wind power data often suffers from missing values due to sensor faults and unstable transmission at edge sites. While federated learning enables privacy-preserving collaboration without sharing raw data, it remains vulnerable to anomalous updates and privacy leakage during parameter exchange. These challenges are amplified in open industrial environments, necessitating zero-trust mechanisms where no participant is inherently trusted. To address...

AccuKnox Awarded Patent for Runtime Security of Kernel Events

AccuKnox Awarded Patent for Runtime Security of Kernel Events

Cyber Security News cybersecuritynews.com

AccuKnox, a leader in Zero Trust Kubernetes and cloud-native security solutions, has been issued a patent [US Patent# 12,242,629 - full PDF copy available] by the U.S. Patent and Trademark Office for the breakthrough technology in Runtime Security of Kernel-Level Events. This innovation delivers real-time detection, prevention, and remediation of anomalous kernel activity. The patented

Bridging the Mobile Trust Gap: A Zero Trust Framework for Consumer-Facing Applications

Bridging the Mobile Trust Gap: A Zero Trust Framework for Consumer-Facing Applications

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.16662v1 Announce Type: new Abstract: Zero Trust Architecture (ZTA) has become a widely adopted model for securing enterprise environments, promoting continuous verification and minimal trust across systems. However, its application in mobile contexts remains limited, despite mobile applications now accounting for most global digital interactions and being increasingly targeted by sophisticated threats. Existing Zero Trust frameworks developed by organisations such as the National...

Implementing Zero Trust Architecture to Enhance Security and Resilience in the Pharmaceutical Supply Chain

Implementing Zero Trust Architecture to Enhance Security and Resilience in the Pharmaceutical Supply Chain

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.15776v1 Announce Type: new Abstract: The pharmaceutical supply chain faces escalating cybersecurity challenges threatening patient safety and operational continuity. This paper examines the transformative potential of zero trust architecture for enhancing security and resilience within this critical ecosystem. We explore the challenges posed by data breaches, counterfeiting, and disruptions and introduce the principles of continuous verification, least-privilege access, and...

What if companies stopped storing customer data at all?

What if companies stopped storing customer data at all?

cybersecurity www.reddit.com

Why are breaches still so common, even at companies with million-dollar security budgets? We encrypt, we deploy IAM, we roll out "zero trust"... and yet attackers keep winning. Maybe the issue isn't weak crypto or bad configs - maybe it's that we keep collecting and stockpiling too much data in the first place. In B2C especially, I've seen the math: prevention vs. breach cost. Too often, it's "cheaper" to accept the breach. Customers pay the real price (fraud, ID theft for years). So here's...

Evaluating Cato, Zscaler, and Cloudflare for zero trust

Evaluating Cato, Zscaler, and Cloudflare for zero trust

cybersecurity www.reddit.com

We were a small but quickly growing startup and security always felt like the weak link in our stack. Our team lived in the cloud, juggling SaaS tools, AWS workloads, and a few legacy pieces still stuck on prem. It worked, but it also felt like anyone with the right key could slip through. We knew we needed zero trust, but actually picking a path was like opening Pandora's box. SASE, SD WAN, private backbone, managed detection. The acronyms alone could give you a headache. We did our homework....

SafeLine: A Free Zero Trust Web Application Firewall for 2026

SafeLine: A Free Zero Trust Web Application Firewall for 2026

Cyber Security News cybersecuritynews.com

Every type of organization - whether it's a multinational giant with thousands of employees or a single tech enthusiast running a homelab - needs a web application firewall (WAF). The reason is straightforward: web applications face constant threats from cyber attacks that can exploit vulnerabilities to steal data, disrupt services, or damage reputation. The costs associated with server resources,

Fortifying the Agentic Web: A Unified Zero-Trust Architecture Against Logic-layer Threats

Fortifying the Agentic Web: A Unified Zero-Trust Architecture Against Logic-layer Threats

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.12259v1 Announce Type: new Abstract: This paper presents a Unified Security Architecture that fortifies the Agentic Web through a Zero-Trust IAM framework. This architecture is built on a foundation of rich, verifiable agent identities using Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs), with discovery managed by a protocol-agnostic Agent Name Service (ANS). Security is operationalized through a multi-layered Trust Fabric which introduces significant innovations,...

Zero Trust: A Strong Strategy for Secure Enterprise

Zero Trust: A Strong Strategy for Secure Enterprise

Cyber Defense Magazine www.cyberdefensemagazine.com

Zero trust frameworks challenge traditional perimeter-based security models by adopting a "never trust, always verify" approach. Unlike legacy security systems, zero trust requires continuous identity verification, strict least-privilege access controls,...