![]() ![]() The challenge of getting to zero trust security Google created BeyondCorp, Forrester has revitalized its focus on zero trust, and security vendors have begun to bandy about the sector’s newest buzzword with breathtaking frequency. Years later, and following several headline-making mega breaches, zero trust security seems to have once again permeated the minds of network security engineers around the world. As a result, it lost a bit of steam and was placed on the backburner of security priorities. No one really knew how to make it happen. While the “zero trust” name certainly had some creative flair and an equally interesting value proposition-to trust no device or network-there was just one problem. At the time, the strategy seemed to one-up its predecessor, the “least privilege” security model, and forced traditional network-centric approaches to walk the proverbial plank. ![]() Eight years ago, a new security strategy called “ zero trust” was introduced to the world by a well-known analyst at Forrester.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |