Research

Key Principles of Zero-Trust Security Explained

Employees can now work and access company data/information from virtually anywhere, thanks to the growing popularity of hybrid working.

Data is constantly moving between data centres, distant devices, SaaS apps, and other locations, giving cybercriminals a greater advantage in collecting and destroying a company’s most valuable assets.

Undoubtedly, a new cybersecurity paradigm is required. This is where the concept of zero-trust comes into play.

By default, a zero-trust approach means that no one, inside or outside the network, can be trusted, and everyone attempting to obtain access to network resources must first verify their identity.

There are six key principles in a zero-trust network that underpin this approach.

Find out what they are:

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Check Also
Close