Putting a Value on Trust — Introducing Zero Trust Security Approaches
Kerry Simon Rea
President of GovEvents and GovWhitePapers ? Marcom Solutions Provider for Government & Industry
With so many high-profile hacks this year, it's easy to want to throw up your hands and say, "Is there nothing that can be trusted?!" Interestingly, that lament is what is driving the latest approach to cybersecurity -- zero trust. Zero trust is what it sounds like, a security approach centered on the belief that organizations should not automatically trust anything accessing their systems either inside or outside their perimeters. Instead, all people and devices must be verified before access is granted. To the untrained eye, this seems untenable. How, in this day and age, when we depend on digital information and connection to do most anything, can we use a process where we have to constantly verify identity and access permissions? Luckily, the practice of zero trust is more sophisticated than its premise.
Remote work due to the pandemic pushed many organizations to implement zero trust practices sooner than planned. A zero trust approach allows employee credentials to be securely used from multiple devices, not just agency issued ones. This allows individuals to log in and do work from any location regardless of if they have the "approved" equipment.
To do this, zero trust involves adopting very granular...Finish reading on GovEvents Blog ??