Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
Story Views
Now:
Last hour:
Last 24 hours:
Total:

Zero Trust is a Buzzword – Fly Direct with dope.security

% of readers think this story is Fact. Add your two cents.


          

 

Zero-trust was proposed in 2010 by John Kindervag of Forrester Research. It found its way into the lexicon of tech jargon , referring to a new security concept different from firewalls and antivirus products. In its core form, Zero Trust was a straightforward idea; to remove the distinction between trusted internal networks versus untrusted external networks.

The Origins of Zero Trust

Kindervag defined Zero Trust as the following: “We must eliminate the idea of a trusted network (usually the internal network) and an untrusted network (external networks).” This wasn’t a new idea by any means. Cybersecurity experts were already on top of the issue that firewalls were little more than fairy dust sprinkling the veneer of secure networks across systems. 

But something about the moniker “Zero Trust” captured many tech-savvy imaginations, and the concept took off. It seems probable that the Forrester report had been ordered up by some vendor looking to grease the skids of selling its wares. 

It’s a common industry occurrence, companies pay analysts to produce reports that support their strategies. So, it’s no surprise that “Zero Tust” became a marketing buzzword. One big vendor picked it up, and before long, others were scrambling to do so, each claiming it was better at implementing and executing Zero Trust principles.

The Rapidly Accelerating Adoption of Zero Trust

Within a few years, it seemed like “Zero Trust” was everywhere in the cybersecurity industry. Every product was described as a core element of Zero Trust architecture. Salespeople would pick it up and integrate it into their pitches, without necessarily knowing what the term meant.

As Zero Trust became a widespread term, a couple of relatively poor attempts to redefine it cropped up. There’s no question that in the original sense Forrester used it, Zero Trust meant a rejection of the perimeter firewall model. Earlier reformulations of the concept are somewhat irrelevant.

Zero Trust: From Buzzword to Reality and Understanding Its Core Principles

Rather than defining what Zero Trust isn’t, consider what it is. Forrester’s definition was further loosened by the National Institute of Standards and Technology (NIST) to include bring-your-own-device policies; Zero Trust assumes no implicit trust based upon physical or network location or asset ownership alone. With this in mind, there are three key principles on Zero Trust you need to know.

Principle #1 – Microsegmentation and Port Isolation

Desktops are the most exposed components of any network. They need to be isolated within their network segments so that they cannot talk to each other. This then stretches to different areas of a network for better control. With micro-segmentation, there’s the prevention of proliferation in case of a breach, which limits lateral movement across the network.

Principle #2 – Remote, BYOD, and the Cloud

We’ve already discussed the limited protection offered by the conventional firewall model. VPNs providing access to internal networks are now viewed as risky. Zero Trust involves embracing these modern challenges and ensuring security protocols regarding remote access and personal devices are in place.

Principle #3 – Identity, Authorization, and Authentication

While IAA have always collectively been a part of cybersecurity protocols, it was pretty hard to administrate them. Privilege principles and multi-factor authentication now make up important features in their implementation. Ensuring the integration of robust identity and access management systems assures a Zero Trust framework.

The general thrust of this kind of framework is aligned with Zero Trust principles. Still, it could have focused more on the actual improvement of security rather than just touting this chic new word. These frameworks mature your security and protect against many threats.

Cloud, BYOD, and Remote Work

The undertones of zero trust need to be embedded within the complexities of enterprise cloud computing, BYOD, and remote work. Passwords can no longer serve as the trusted source for authentication alone. So, MFA has become the norm in organizations. These measures, while not necessarily labeled “Zero Trust,” become critically necessary. Implement robust IAM solutions to protect your environment and securely manage and monitor all devices.

Threat Responses and Bad Recommendations

Ransomware and nation-state attacks leverage exploits in the trusted internal network. This issue caused industries to reduce the level of internal trust after experiencing significant breaches. Effective response plans against ransomware rely on micro-segmentation, hierarchical domains, and privileged workstations to harden perimeter security. In a Zero trust approach, focusing on implementing and executing more advanced techniques provides better security in general.

The Reality of Zero Trust – Market Influences and Practical Application

The term “Zero Trust’ is itself a kind of buzzword mirroring the antiquated reliance of the market on vendors and analysts to define cybersecurity strategies. Vendors have grasped Zero Trust when rolling up their marketing. As such, the principles underlying it remain valid. 

Don’t add network components without optimizing the tools you have. Proactive vendors, such as Microsoft and Cisco, pay due attention to the technical insights coming from vendors. Wring out everything you’ve got by executing Zero Trust principles across the board. 

Suboptimum outcomes are what you get when making vendors the lynchpin in your security strategy. You need to develop a strategy of what works best for you and not on what’s marketed. In-house ownership of your strategy guarantees that it responds to your organization’s unique needs and goals. Taking matters into your hands reduces risk and enhances security measures to achieve lasting results. That’s the goal. Working with the right partner makes all the difference in achieving th desired outcomes.

 

Zero Trust and Your Organization

While “Zero Trust” might have been coined as a buzzword, it does describe extreme changes in the fabric of people’s minds toward the security aspect of computing. This concept ensures organizations build resilience based on implicit trust within their internal networks through solid identity and authentication practices, segmentation, and other strategies. 

By working with dope.security, you get the best of Zero Trust executed with the latest cybersecurity initiatives and strategies to safeguard your organization from ever-present growing threats. Dope.Security takes a fresh approach to securing your networks using the latest protocols proven to provide lasting results against cybersecurity threats looming over your business.



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Humic & Fulvic Liquid Trace Mineral Complex

HerbAnomic’s Humic and Fulvic Liquid Trace Mineral Complex is a revolutionary New Humic and Fulvic Acid Complex designed to support your body at the cellular level. Our product has been thoroughly tested by an ISO/IEC Certified Lab for toxins and Heavy metals as well as for trace mineral content. We KNOW we have NO lead, arsenic, mercury, aluminum etc. in our Formula. This Humic & Fulvic Liquid Trace Mineral complex has high trace levels of naturally occurring Humic and Fulvic Acids as well as high trace levels of Zinc, Iron, Magnesium, Molybdenum, Potassium and more. There is a wide range of up to 70 trace minerals which occur naturally in our Complex at varying levels. We Choose to list the 8 substances which occur in higher trace levels on our supplement panel. We don’t claim a high number of minerals as other Humic and Fulvic Supplements do and leave you to guess which elements you’ll be getting. Order Your Humic Fulvic for Your Family by Clicking on this Link , or the Banner Below.



Our Formula is an exceptional value compared to other Humic Fulvic Minerals because...


It’s OXYGENATED

It Always Tests at 9.5+ pH

Preservative and Chemical Free

Allergen Free

Comes From a Pure, Unpolluted, Organic Source

Is an Excellent Source for Trace Minerals

Is From Whole, Prehisoric Plant Based Origin Material With Ionic Minerals and Constituents

Highly Conductive/Full of Extra Electrons

Is a Full Spectrum Complex


Our Humic and Fulvic Liquid Trace Mineral Complex has Minerals, Amino Acids, Poly Electrolytes, Phytochemicals, Polyphenols, Bioflavonoids and Trace Vitamins included with the Humic and Fulvic Acid. Our Source material is high in these constituents, where other manufacturers use inferior materials.


Try Our Humic and Fulvic Liquid Trace Mineral Complex today. Order Yours Today by Following This Link.

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

MOST RECENT
Load more ...

SignUp

Login

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.