3 Keys To An Effective Zero Trust Access Strategy
CSO Online, February 11th, 2021
February 21, 2021,
Volume 275, Issue 3

Peter Newton writes in CSO Online, "The reality is that no network is an island, and as businesses become more digital, networks inevitably become more complicated and dispersed. Today's networks now have many 'edges,' so it's much harder than it used to be to create a single defensible boundary. In the face of these changes, the traditional network perimeter is dissolving, and it's far more difficult to tell who and what can be trusted.

To respond to increasing threats, best practices now stipulate a "trust no one, trust nothing" attitude toward network access. Protecting the network with this zero-trust access (ZTA) approach means that all users, all devices, and all web applications from the cloud must be trusted, authenticated, and have the correct amount of access privilege (and no more.)..."

Read More ...


Other articles in the IT News - Security section of Volume 275, Issue 3:

See all archived articles in the IT News - Security section.