Results 131 to 140 of about 773 (179)

The Transitioning from Individual Implementation of Zero Trust Architecture to AI-driven Tools : Reducing Manual Workloads and Increasing Efficiency through AI in ZTA

open access: yes
Zero Trust Architecture (ZTA) has emerged as a fundamental security framework for Information Technology (IT) companies seeking to enhance their cybersecurity posture. Nordic based IT companies, such as Atea, face challenges in manually implementing ZTA due to its complexity and the time required for individuals.
openaire   +1 more source

Understanding security challenges in the software supply chain through causal relationships. [PDF]

open access: yesPLoS One
Adem A   +4 more
europepmc   +1 more source

ZTA-FedIDS: A Zero-Trust Architecture-Integrated Federated Intrusion Detection System with Explainable AI for Enterprise Network Cybersecurity

open access: yes
Abstract Hybrid cloud setups, scattered remote teams, and the boom in IoT devices have basically wiped out the old idea of a network perimeter. The network isn’t a closed castle anymore—it’s porous, sprawling, and way more complicated.
openaire   +1 more source

Design of a Trustworthy Cloud-Native National Digital Health Information Infrastructure for Secure Data Management and Use. [PDF]

open access: yesOxf Open Digit Health
Zao JK   +21 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy