Why Zero Trust ?



permeter

Cybersecurity has historically been modelled around perimeter of trust. Trusted Users, trusted user devices and trusted network segments are three fundamental entities which are considered safe and trustable.
Complying to this security model, businesses spend huge amount of security budgets to protect their critical data from unknown outsiders.
Yet....

The failing security model of trust

Hackers have been expoiting the very trust model business rely upon and above data points are just a real world validation of this.
  • Phishing is still popular choice among hackers because all the they need to do is phish user credentials and when it comes to fooling weakest link in security (read humans), it just works.
  • Cracking corporate perimeter is still a thing because all the atacker needs to do is get their weponized code inside trusted network. Once inside, sky is their limit.
Infact, among data breaches analysed by trustwave on 2018, 57% of breaches included compromised internal network.

What do you do when the core trusted factors we rely upon are the one exploited and used against us?


Enter zero trust framework!


Learn more about what exactly is zero trust in part 2 of this blog entitled what is zero trust ?