Future of Work News Free eNews Subscription

The Time for Zero Trust Is Now

By

A Zero Trust approach to security, where risk is eliminated by removing issues at the surface, is becoming important today with more users connecting to more applications using more devices from more locations. It inherently increases risk at a time when cyber crime continues grow.

For organizations, implementing zero trust means understanding sensitive data and dedicating an area of the network to it. It also means consistently monitoring the environment and mapping acceptable routes for data access.

To help organizations better understand the importance and need for zero trust, Info-Tech recently released a research-backed blueprint, “Build a Zero Trust Roadmap,” to review the basics and offer guidance on how to move away from perimeter-based security.

"For the longest time, security teams have focused on reducing the attack surface to deter malicious actors from attacking organizations. However, I dare say that effort has only made these actors scream 'challenge accepted,'" said Victor Okorie, senior research analyst at Info-Tech Research Group.

"With sophisticated tools, time, and money in their hands, threat actors have embarrassed even the finest of organizations,” he added. “A hybrid workforce and rapid cloud adoption have also introduced more challenges as the perimeter shifted and the internet became the corporate network. A new zero trust mindset needs to be adopted to stay on top of the game and effectively mitigate attacks."

The problem for most organizations when it comes to implementing zero trust is that IT leaders do not have an accurate assessment of readiness or understand the adoption benefits.

"The success of most attacks is tied to denial of service, data exfiltration, and ransom," said Okorie. "A shift from focusing on the attack surface to the protected surface will help organizations implement an inside-out architecture. This approach protects critical infrastructure, prevents the success of any attack, makes it difficult to gain access, and links directly to business goals."

To succeed at zero trust, they need a strategy that is built upon best practices and is supported by business stakeholders. By adopting zero trust, there are the benefits of reduced business risks and the instances of a malicious attack as well as reduced CapEX and OPEX thanks to lower staffing requirements and improved time-to-response.

But, as with any security strategy, success is predicated on consistency and enforcement. It’s not something that can be done occasionally. It should be part of an evolving, repeatable process that leverages all available technologies to protect all attack surfaces.




Edited by Erik Linask
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Future of Work Contributor

SHARE THIS ARTICLE

Related Articles

4 Key GFI Products Now Powered by AI

By: Greg Tavarez    4/23/2024

GFI announced the integration of its CoPilot AI component into four of its core products.

READ MORE

A Winner's Mindset: Alan Stein Jr. Helps Businesses Build Winning Teams

By: Alex Passett    4/22/2024

At SkySwitch Vectors 2024 in downtown Nashville, Tennessee, last week, the keynote speaker was Alan Stein Jr. He stylishly presented to the Vectors au…

READ MORE

Atomicwork and Cohere Partner on AI-Powered Workplace

By: Greg Tavarez    4/22/2024

Atomicwork launched its innovative digital workplace experience solution, co-developed with Cohere.

READ MORE

Hybrid Work Fuels Demand for SASE, Zero-Trust Security

By: Greg Tavarez    4/16/2024

Around 80% of respondents said hybrid work is driving the need for SASE and zero-trust networking tools, according to an Aryaka report.

READ MORE

Akooda Announces New AI-Powered Enterprise Search Platform

By: Tracey E. Schelmetic    4/15/2024

Operations intelligence solutions provider Akooda recently announced its AI-powered Enterprise Search platform, which it noted was designed to allow e…

READ MORE