+1 (970) 414-2609
  • Active Campaign
  • Global News
Friday, June 2, 2023
  • Home
  • About Us
  • Our Experts
  • AI Tools
  • Our Work
    • Education
    • Community
    • Humanitarian
No Result
View All Result
Boys & Girls Clubs of Senegal
No Result
View All Result
Home Cybersecurity

Zero Trust: The What, Why And How

by christeen catt
April 9, 2023
in Cybersecurity
Reading Time: 4 mins read
A A
464
SHARES
1.8k
VIEWS
Share on FacebookShare on Twitter

Etay Maor is Senior Director, Security Strategy for Cato Networks, a developer of advanced cloud-native cybersecurity technologies.

getty

The rising severity and frequency of cyberattacks and data breaches indicate that current approaches to cybersecurity are ineffective against modern cyber threats.

This is because most organizations are heavily focused on perimeter-based security—building defenses around specific security locations to prevent threats from entering the network. This approach also assumes that everyone inside the network is trusted and should have access to all resources. Unfortunately, this is very much an outdated concept.

Many employees are accessing corporate resources from outside of the perimeter, and applications that were once hosted inside an organization’s data center are now hosted on the public cloud. Furthermore, a perimeter-based approach does not have visibility into anything that’s happening inside the corporate perimeter. In the case of an attacker using stolen credentials to infiltrate an organization or breaching defenses through a vulnerable supply chain partner, perimeter-based security does not offer protection or visibility.

One of the best ways to overcome these shortcomings is by deploying a zero-trust architecture (ZTA).

What Is Zero Trust?
Zero trust is a security model that does not trust any user or application by default. Zero trust assumes that the network is already compromised and that trust needs to be reassessed and reestablished. In other words, it’s a system that denies everyone and everything until the identity of the user is confirmed and the context of the request is established.

Compared to a traditional model where authenticated users receive implicit access to all resources, a zero-trust model authorizes access only to those resources that are verified by a set of attributes such as an identity, a fingerprint, job role, etc.

Why Do Organizations Need Zero Trust?
A zero-trust model can help improve an organization’s security posture in many ways that legacy security approaches cannot. Benefits include:

• Reducing the risk of privilege escalation. Zero trust allows network administrators to define extremely granular policies around sensitive resources and erect micro-perimeters around specific applications and workloads. This prevents attackers from moving laterally and inflicting further damage to the organization.

• Stopping insider threats. Legacy security solutions cannot prevent attacks from malicious insiders, nor can they provide in-depth visibility into their activities. Zero trust can ensure that each user does not have more access than necessary and can also provide granular visibility on each and every user activity.

• Locking down cloud access. Zero trust restricts access to cloud applications based on business requirements. Since every user or application is subject to clearly defined access permissions, only authorized users or applications will be permitted to access those cloud environments.

Which Technologies Help Enable A Zero-Trust Architecture?
Zero trust isn’t a specific technology, per se, but a foundation on which the entire security stack resides. While zero trust can mean different things to different organizations, there are a number of core technologies that are designed to enable it, including:

1. Zero Trust Network Access: ZTNA helps set up a software-based perimeter that defines which data centers, environments or applications a user can access. It allows organizations to break down networks into smaller zones (i.e., micro-segmentation), which is an effective way to control the lateral movement of attackers.

2. Identity and Access Management: IAM systems help enforce least privilege access across the business, from users to contractors to customers. One can also enforce granular permissions that are based on the time and geolocation of users.

ADVERTISEMENT

3. Secure Access Service Edge: SASE makes it easier to implement and manage zero trust because it packages technologies like ZTNA, firewall as a service, secure web gateway, cloud access security broker (CASB) and SD-WAN under a single console and managed service offering.

4. Security Orchestration, Automation and Response: SOAR helps analyze anomalous traffic and derives actionable information from siloed security tools. It helps automate manual security processes and improve response times.

How Can Businesses Get Started With Zero Trust?
To achieve zero-trust maturity, organizations must learn to walk before they can run. Below are some basic steps to kick-start the zero-trust journey:

1. Identify critical data, processes and services as well as sensitive data flows.

2. Formalize your plan, policies and framework to implement zero trust.

3. Identify and deploy tools that can help achieve your immediate zero-trust goals. ZTNA or SASE are recommended, as these can significantly accelerate your journey to zero trust.

4. Build micro-perimeters around sensitive data, applications or services, and implement access controls based on the principle of least privilege. Lock down remote access.

5. Continuously monitor your endpoints, gateways and sensitive data flows for vulnerabilities, weaknesses, signs of a potential attack, or breach and compliance failures.

6. Keep fine-tuning and tightening your zero-trust policies and controls as you learn about user behavior, security vulnerabilities and security incidents.

Gartner Inc. predicts that by 2025, 60% of organizations will embrace zero trust but that more than half will fail to realize its benefits. This is because the model isn’t just a shift from legacy perimeter-based security to advanced location-agnostic security; it also represents a shift from the legacy mindset of implicit trust to one that is focused on identity and context.

This is why it’s important for organizations to consider technologies like IAM, SASE and SOAR that are not only purpose-built around identity and context but can also provide end-to-end visibility and control across the entire enterprise.

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Previous Post

The camera never lied… until artificial intelligence told it to

Next Post

SG’s Eleos Labs, Grab join forces to combat Web3 cyber threats

Related Posts

United Airlines CISO Deneen DeFiore on elevating cyber’s value to the business

by vladimir karaj
May 28, 2023

Interview May 25, 20238 mins Business IT AlignmentCSO and CISOData and Information Security The airlines’ cyber chief believes storytelling, facilitation,...

Read more

Cyber threats to nuclear weapons

by james bamford
May 26, 2023

“The more connected we get, the more we need to be concerned about security. The more we depend on technology,...

Read more

Navigating the Cyber Landscape: How to Protect Your Data from Threats

by BGC Senegal
May 21, 2023

As the digital world rapidly grows, navigating the cyber landscape can be daunting. With so many potential threats to data,...

Read more

Cyber beware: Unmasking the Perils of the Digital Domain

by BGC Senegal
May 21, 2023

Technology has revolutionised the way we communicate, shop, and work. But with it's rapid advancements come hidden dangers lurking in...

Read more

The Growing Web of Cyber Threats

by BGC Senegal
May 21, 2023

As the Internet of Things expands, connecting billions of devices across the globe, the web of cyber threats grows infinitely...

Read more

MITRE publishes policy checklist for healthcare cybersecurity

by lifestyle nigeria
May 12, 2023

MITRE has developed a new report in response to the policy paper, Cybersecurity is Patient Safety: Policy Options in the...

Read more
Next Post

SG’s Eleos Labs, Grab join forces to combat Web3 cyber threats

ADVERTISEMENT

Trending Posts

Bitcoin

Bitcoin NFTs Level Up: Introducing BRC-721E Token Standard for Ethereum Migration

by margarete center
June 1, 2023

Bitcoin NFTs just took a giant leap forward thanks to the BRC-721E token standard. TL;DR: Enables Ethereum-based ERC-721 projects to...

Read more

Bitcoin NFTs Level Up: Introducing BRC-721E Token Standard for Ethereum Migration

First Mover Asia: Bitcoin Settles Above $27.1K After Early Wednesday Dip as Rate Hike, Inflation Worries Heighten

Bitcoin, Crypto Prices Brace for Downturn in Coming Liquidity Shock, Observers Say

Federal Reserve Says Higher Rates Could Exacerbate Stress For Banks, But What of Bitcoin?

What Would Happen to Bitcoin If The US Debt Ceiling Cracks (Opinion)

South Africa Could Ease Blackouts By Burning Heavy Fuel Oil

Load More

Popular Posts

How to open a bank account in the US?

by BGC Senegal
February 4, 2023

  How to Open a Bank Account in the US? Opening a bank account in the US can be a...

Leading vs Managing

by BGC Senegal
January 28, 2023

Leading vs Managing: What's the Difference? Leadership and management are two key elements in any successful business. But how do...

Master Your Lexicon: Invest in Suffixes!

by BGC Senegal
May 21, 2023

Boost your lexicon and expand your vocabulary, by investing in suffixes. Instead of memorizing words one-by-one, focusing on suffixes can...

Facebook Twitter LinkedIn Youtube

NEWSLETTER

Subscribe to our newsletter and be the first to know about our upcoming events and programs.

QUICK LINKS

  • About Us
  • Learning Center
  • Active Campaign
  • Privacy Policy
  • Terms and Conditions
  • Contact us
  • Global News

CONTACT INFO

  • info@senegalbgc.org
  • For donations contact us at: donate@senegalbgc.org

© 2019-2023 Boys & Girls Clubs of Senegal. We are a 501 (C)(3) organization and donations are tax deductible. - EIN: 83-3699796

No Result
View All Result
  • Home
  • About Us
  • Our Experts
  • AI Tools
  • Our Work
    • Education
    • Community
    • Humanitarian

© 2019-2023 Boys & Girls Clubs of Senegal. We are a 501 (C)(3) organization and donations are tax deductible. - EIN: 83-3699796

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT