Approach Cybersecurity with Zero Trust Strategies - Deepstash
Metaverse

Learn more about cybersecurity with this collection

Find out the challenges it poses

Learn about the potential impact on society

Understanding the concept of Metaverse

Metaverse

Discover 76 similar ideas in

It takes just

11 mins to read

Approach Cybersecurity with Zero Trust Strategies

Approach Cybersecurity with Zero Trust Strategies

  • According to a recent survey conducted by iSMG, 100% of the respondents said that Zero Trust is critical to reducing their cybersecurity risk.
  • 46% said Zero Trust is the most crucial security practice.
  • Another survey by Forrester showed that 78% of security executives plan to raise their use of Zero Trust in 2022.

However, there's an execution problem with Zero Trust.

  • Forrester's survey reports full deployment of Zero Trust at only 6%.
  • 30% said Zero Trust is in partial deployment or production,
  • and 63% are in assessment, strategy or pilot phases.

As a result, many are just planning, not executing.

13

83 reads

MORE IDEAS ON THIS

Cybersecurity vs. Cyber-Resilience

Zero Trust models include Google's BeyondCorp, Gartner's CARTA, NIST 

14

34 reads

Understand the protection surface

It's normal to start risk assessment with attack surface analysis. For example, security professionals look at where the perimeter is, how someone might break in and what method they might use.

With Zero Trust, it is different. The highest value and highest risk users and assets

15

64 reads

Building The New Boundary - Micro-segmentation

Data centres traditionally manage networks and surrounding environments by creating a "micro-boundary" in the data centre with a differential segment, meaning only pre-approved traffic flows can pass.

When building a Zero Trust Architecture, the principle is the same, but the network

13

37 reads

Reducing Attack Surface

Reducing Attack Surface

Remote workers accessing your network increase the attack surfaces on a new scale. The security team should find ways to reduce the attack surface to minimize exposure.

Internally, a micro-segmentation approach gives a secure 1:1 connection to authorized resources.

We can also app...

15

36 reads

Aligning Identities

Identity is the foundation of Zero Trust security. It means knowing where all identities originate: user identities, service accounts, application sessions, ephemeral identities, and cloud assets.

Identity-based Zero Trust continually monitors every access request made by all users to any r...

15

35 reads

Maximizing Visibility

Maximizing Visibility

You can't protect what you can't see. First complete visibility to understand how everything connects and behaves, which is the cause of security gaps or broken workflows.

Once they get complete visibility, they can understand what trust and enforcement policies the...

14

40 reads

CURATED FROM

CURATED BY

catherinma

Land/geomatics surveyor

With cybersecurity, the question is no longer only how to keep bad players out. Instead, the priority is how to recover as quickly as possible once an attack occurs.

Read & Learn

20x Faster

without
deepstash

with
deepstash

with

deepstash

Access to 200,000+ ideas

Access to the mobile app

Unlimited idea saving & library

Unlimited history

Unlimited listening to ideas

Downloading & offline access

Personalized recommendations

Supercharge your mind with one idea per day

Enter your email and spend 1 minute every day to learn something new.

Email

I agree to receive email updates