Nine Best Practices for Zero Trust

With the escalation of hostilities in Ukraine, increased activity by cybercriminal groups, and an ever-expanding attack surface caused by enterprises migrating to the cloud and employees moving to home offices, zero trust has become cybersecurity’s most valuable player.

The old model of security was that of a castle, with walls, moat and drawbridge, said Michael Salihoglu, cybersecurity managing consultant at Crowe, a public accounting, consulting, and technology firm.

“Once you’re inside the castle, you’re basically a citizen and can do anything you want,” he said. “You’ve got a hard shell and a soft underbelly.”

Zero trust is a major shift in how security is approached, he told Data Center Knowledge.

Read full article at Data Center Knowledge.