Person, Clothing, Advertisement, Poster, Flyer, Paper, Suit, Coat, Overcoat, Crowd

Zero Trust Security vs. Zero Touch Security 

Nandita Bery

For the past years, if you were to whip a cybersecurity bingo card out in conferences, you would undoubtedly mark “blockchain,” “defense in depth,” “security by design,” and recently, “zero trust” aka ZT. Zero trust has been getting all the buzz lately for shifting defenses from traditional, network-based perimeters to focus on users, assets, and behaviors. Zero trust, as the name implies, assumes there is no implicit trust granted to users or devices.  Zero trust employs a more granular perimeter control based on identity (i.e., users), devices, geolocation, and historical usage patterns to identify whether something is to be trusted…

The post Zero Trust Security vs. Zero Touch Security  appeared first on Interconnections - The Equinix Blog.

Read more >

Posted by Nandita Bery on Aug 5, 2022

Join the Equinix Talent Network

Sign in with LinkedIn
Autofill my information with LinkedIn

Not You?

Thank you!