Wednesday , April 30 2025

CSA Launches First Zero Trust Certification

CSA has introduced the CCZT, which is the industry’s first zero trust certification. CSA explained that the certification addresses the changing world of widespread technology and the shortcomings of outdated security approaches. Its goal is to provide security experts with the necessary knowledge to create and execute a zero trust strategy.

Zero trust is seen by many as the future of information security. Jim Reavis, CEO and co-founder of the Cloud Security Alliance, highlighted its usefulness in different areas like industrial control systems, cloud computing, and generative AI.

“bCloud” Starts Journey in Bangladesh Targeting Cloud Solutions

Banglalink, the country’s leading digital operator, has launched bCloud, its very own cloud service brand aimed at delivering world-class cloud...
Read More
“bCloud” Starts Journey in Bangladesh Targeting Cloud Solutions

Researcher Found Multiple Vulnerabilities In Apple’s AirPlay Protocol

Security vulnerabilities in Apple's AirPlay Protocol and SDK put both third-party and Apple devices at risk of various attacks, including...
Read More
Researcher Found Multiple Vulnerabilities In Apple’s AirPlay Protocol

Massive Attack: Hacker Actively Use 4800+ IPs To Attack Git Configuration Files

A recent increase in cyber reconnaissance has endangered thousands of organizations, as GreyNoise, a global threat intelligence platform, reported a...
Read More
Massive Attack: Hacker Actively Use 4800+ IPs To Attack Git Configuration Files

CISA Adds Actively Exploited Broadcom Flaws to KEV Database

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two high-severity security flaws affecting Broadcom Brocade Fabric OS and Commvault...
Read More
CISA Adds Actively Exploited Broadcom Flaws to KEV Database

Google reports 97 zero-days exploited in 2024, 50% in spyware attacks

Google's Threat Intelligence Group (GTIG) reported that in the year 2024, attackers exploited 75 zero-day vulnerabilities, with over 50% related...
Read More
Google reports 97 zero-days exploited in 2024, 50% in spyware attacks

Palo Alto Networks to Acquire AI Security Firm “Protect AI”

On Monday, Palo Alto Networks confirmed it is acquiring the US-based AI security company Protect AI. Protect AI has created...
Read More
Palo Alto Networks to Acquire AI Security Firm “Protect AI”

CISA Releases Seven ICS Advisories

On April 24, 2025, CISA published seven advisories addressing security issues, vulnerabilities, and exploits related to Industrial Control Systems (ICS)....
Read More
CISA Releases Seven ICS Advisories

India Launches First Quantum Computing Village in Amaravati

India has taken a monumental stride toward next-generation technology by initiating its first Quantum Computing Village, a state-of-the-art project in...
Read More
India Launches First Quantum Computing Village in Amaravati

400+ SAP NetWeaver Devices Vulnerable to 0-Day Attacks

Shadow servers found 454 vulnerable SAP NetWeaver systems at risk from a critical zero-day exploit currently being used in attacks....
Read More
400+ SAP NetWeaver Devices Vulnerable to 0-Day Attacks

30 Teams Qualify for Online Preliminary Round At UAP CTF Contest

Blind_Virus, DU_Featherless_Bipeds and Hidden investigations team secure the 1st , 2nd and 3rd positions accordingly for online preliminary round at...
Read More
30 Teams Qualify for Online Preliminary Round At UAP CTF Contest

“Zero Trust ‘never trust, always verify’ principles are clearly the path forward, and we anticipate virtually all organizations to apply this strategy to diverse technological environments in order to protect strategic assets and prevent breaches,” Reavis said.

CCZT program provides a comprehensive education that includes best practices endorsed by industry experts, standards bodies, and governments. It incorporates principles from sources like CISA, NIST, CSA Research, and the expertise of zero trust pioneer John Kindervag.

“Having an actual measuring stick could be the impetus that companies need to really commit to ZTA [zero trust architecture(s)] and understand the outcomes,” commented Jonathan Trull, chief security officer at Qualys. “Being certified will help organizations establish clear goals and be more effective in implementation.”

CCZT is expected to be important for organizations adopting zero trust. Gartner estimates that 60% adoption will happen by 2025. Dean Webb from Merlin Cyber agrees with this.

“As firms add CCZT to their list of desired and required certifications, it will drive IT professionals in general to seek the certification as a gateway to future opportunities,” Webb said. “As that happens, firms will adopt more zero-trust practices simply because they have the staff on hand that understand them and want to see them in place.”

Check Also

symlink

16,000+ Fortinet devices compromised with symlink backdoor, Mostly in Asia

According to Shadowserver Foundation around 17,000 Fortinet devices worldwide have been compromised using a new …

Leave a Reply

Your email address will not be published. Required fields are marked *