The Ultimate Guide to Zero Trust Security

2026 · Kiwi Edition

Zero Trust Security represents a modern approach to cybersecurity that assumes no inherent trust exists within or outside an organisation's network. Every access request must be verified continuously, ensuring strict identity verification and least-privilege access to protect data and infrastructure.

The latest developments in Zero Trust Security show its expanding role across multiple technologies, including identity and access management, privileged access controls, endpoint protection, and cloud security platforms. Organisations are adopting Zero Trust frameworks to address challenges like remote work vulnerabilities, ransomware threats, and complex hybrid IT environments.

By exploring the stories tagged with Zero Trust Security, readers can understand how this security model integrates innovations like multi-factor authentication, AI-powered threat detection, and secure access service edge (SASE) solutions. These insights are valuable for IT professionals, security leaders, and businesses aiming to enhance resilience against evolving cyber threats in a digital-first world.

Kiwi Zero Trust Security news
Analyst Insights
Check Point tops Miercom hybrid mesh security benchmark
Miercom · Zero Trust Security · Firewalls
Yesterday
Protegrity launches AI Team Edition for secure inferencing
IDC · Zero Trust Security · Virtualisation
Last week
Survey finds organisations struggle to secure unstructured data
Gartner · Zero Trust Security · Data Protection
Last month
Codenotary launches AgentX for Linux security automation
Gartner · Zero Trust Security · Virtualisation
Last month
DigiCert updates document signing tool to curb AI fraud
Frost & Sullivan · Zero Trust Security · Data Protection
Last month
Expert columns
Turning security into a story: How managed service providers use reporting to drive retention and revenue
By Scott Jenkins of SonicWall
Today
VPN vulnerabilities don't have to become breaches
By Jerome Lowe of SonicWall
Today
Why runtime identity is emerging as the next cybersecurity imperative
By Ash Diffey of Ping Identity
3 days ago
Proof beats promise: The trust crisis AI is creating
By Lakshmi Hanspal of DigiCert
4 days ago
Mythos changes everything: Is your AI agent security ready?
By Dev Rishi of Rubrik
4 days ago
Building security outcomes for small businesses: Why breaches persist despite available tools
By Debasish Mukherjee of SonicWall
Last week
The hidden risk in New Zealand's digital transformation
By Dr Steven Woodhouse of Fortinet Australia and New Zealand
Last week
Small alert, big defense: Inside a SOC's early-morning response
By Sarah Wilkinson of SonicWall
This month
From APIs to MCPs: The new architecture powering enterprise AI
By Srinivas Gutta of Adactin
This month
Why AI-powered security needs network telemetry across the hybrid cloud
By Ryan Mahoney of Gigamon
Last month
The agentic evolution: Why high-fidelity data is the lifeblood of the modern SOC
By Simon Howe of ExtraHop
Last month
From 398 to 200 Days: Understanding the TLS Certificate Lifespan Reduction
By Daniel Sutherland of DigiCert
Last month
Secure by default: Moving beyond secure by design
By Chandrodaya Prasad of SonicWall
Last month
Kernel in the crosshairs: The BlackSanta threat campaign targeting recruitment workflows
By Aditya K. Sood of Aryaka
Last month
Why the next endpoint and SASE disruption will not come from a security vendor
By Chandrodaya Prasad of SonicWall
Last month
Interviews
Netskope's Tony Burnside - visibility is key to AI security
Discussing Shadow IT
Last week
Entrust and Chillisoft partner to kick cybersecurity goals
Discussing Firewalls
Last month
'Human Risk' takes centre stage - Mimecast CEO
Discussing Data Protection
Last month
How Formula 1 turns data & cyber security into speed
Discussing Firewalls
Last month
Rise of AI Agents introduces new infosec risk: Okta
Discussing Data Protection
Last month
Recent news
Infosecurity Europe adds AI summit amid cyber defence shift
About Data Protection
Today
Barracuda spots 7 million device code phishing attacks
About Enterprise security
Today
Wiz expands AI security coverage across cloud & edge
About Shadow IT
Today
Elastic ties security platform to Google's air-gapped cloud
About Public Sector
Today
VIPRE report says attackers shift to trusted services
About Spam
Yesterday
Thales launches Imperva for Google Cloud in controlled availability
About Firewalls
Yesterday
Check Point teams with Google Cloud on AI agent security
About Firewalls
Yesterday
Ping Identity wins Google Cloud security partner award
About Data Protection
Yesterday
Dell launches PowerMaxOS 10.4 with faster, safer storage
About Storage
Yesterday
Silverfort & SentinelOne unite on AI identity security
About Endpoint Protection
Yesterday
Google Cloud unveils AI security tools & fraud defence
About Firewalls
Yesterday
Zscaler joins Anthropic Project Glasswing on cyber AI
About Firewalls
2 days ago
SUSE launches AI Factory with NVIDIA for enterprise control
About Cloud Services
2 days ago
Zero Networks launches AI segmentation to curb shadow AI
About Firewalls
2 days ago
The Gentlemen becomes second most active ransomware group
About Cloud Services
2 days ago
Job moves
Coro promotes Benjamin Morrell to security strategy role
Move at Anomali
Today
Saviynt names Tim Wedande APJ Field Chief Technology Officer
Move at Ernst & Young
Yesterday
Island names Hugh Darvall APAC Channel Lead amid push
Move at Island
Yesterday
Portnox names Jonathan Skinner as Chief Marketing Officer
Move at Symantec
Last week
Ping Identity names Antony Collins to lead APJ channels
Move at ServiceNow
Last week
Yubico appoints chief marketing officer as phishing grows
Move at Yubico
Last month
Saviynt names Alex Lei to lead APJ identity security sales
Move at Proofpoint
Last month
Okta names Christian Rota ANZ director of partnerships
Move at Okta
Last month
Delinea boosts EMEA, APAC growth with senior hires
Move at CyberArk
Fri, 20th Feb 2026
Okta names Dan Mountstephen to lead APJ identity push
Move at Centrify
Mon, 2nd Feb 2026
Top players
Other guides