Nvidia Introduces a Full-Stack Solution for Zero Trust Security

Nvidia is fast-tracking its cybersecurity efforts, emphasizing zero trust through new product integrations designed to protect enterprise customers from attack while supporting artificial intelligence, machine learning and server workloads that scale. Earlier this month Nvidia promoted its full-stack data center security solution: DOCA 1.2 accelerated software, running on BlueField-3 DPUs using the Morpheus AI framework — a configuration that can “secure a data center at every touchpoint,” including users, devices and the data itself, Nvidia founder and CEO Jensen Huang explained at Nvidia’s GTC 2021 event earlier this month. Continue reading Nvidia Introduces a Full-Stack Solution for Zero Trust Security

Government Pursues ‘Zero Trust’ Approach to Cybersecurity

The “zero trust” policy envisioned by President Biden in May when he signed an executive order to improve cybersecurity has begun taking shape with the release last week of a draft blueprint by the White House Office of Management and Budget (OMB). While Biden’s order covers the public and private sectors “and ultimately the American people’s security and privacy,” zero trust focuses on identifying and implementing best practices for the federal government’s digital platforms and processes. Deployment will take years of investment and effort. To help jump-start the initiative, some primers have hit the news feeds. Continue reading Government Pursues ‘Zero Trust’ Approach to Cybersecurity

Google Unveils an Internal System for Secure Remote Access

Google debuted BeyondCorp Remote Access, a cloud-based service allowing remote access of internal systems without using a virtual private network (VPN). With so many employees working from home during the coronavirus pandemic, Google said it has “heard repeatedly … that organizations need an easier way to provide access to key internal applications.” Based on a product built for internal use almost ten years ago, the system uses a “zero-trust approach,” which requires additional authentication before granting access. Continue reading Google Unveils an Internal System for Secure Remote Access