What Is Zero Trust?
ServerWatch, July 22nd, 2022
July 31, 2022,
Volume 292, Issue 4

In the past, network security was implemented in such a way that assumed user accounts that already had access to a network were trustworthy.

"However, writes William Elcock in ServerWatch, "the increasing popularity of cloud environments and remote work has created more opportunities for threat actors to gain unauthorized network access.

The problem with the traditional network segmentation model is that it only requires verification for users and systems outside of the network. This approach falls apart in today's world.

On the other hand, zero trust requires constant validation-even for internal network connections. This greatly reduces the chance of a cyber attack. Even if one does occur, this strategy greatly reduces the potential damage it may cause..."

Read More ...


    Other articles in the IT News - Security section of Volume 292, Issue 4:

    See all archived articles in the IT News - Security section.