What is Zero Trust? Let's take a look at the future of security.
Zero Trust is a transition from implicit trust—assuming that everything inside a corporate network...
By: Chris Schalleur on Aug 24, 2021 10:54:18 AM
This week, Microsoft has made a significant investment in a Zero Trust company known as Rubrick. Zero trust makes the assumption that such perimeter security approaches are destined to fail and that systems have already been penetrated. You can then operate to mitigate the damage and the risk.
The Zero Trust (ZT) model of security is showing a great deal of promise... While Zero Trust has traditionally been used as a network security model, the principles also apply to data security and security architecture in general. ZT extends the principle of "least privilege" to its ultimate conclusion: Trust no one and grant the least privilege so that once a user's identity is verified, they only get access to the role they're assigned -- nothing more. It is the opposite of the prevailing "trust but verifies" model of access control that allows users with basic credentials to have broad access to digital assets. Instead, ZT takes a "verify but trust" approach that closes off access until the user's identity is confirmed, and then only grants the minimal access privileges to complete the assigned task.
You can read more about the acquisition here: Microsoft Zero Trust
Zero Trust is a transition from implicit trust—assuming that everything inside a corporate network...
Businesses have become much more aware of the threats, and shortcomings in their environment while...
The Kaseya ransomware attack that took place on July 2nd has sent shockwaves throughout the...