About a year ago, I penned a piece in Forbes on zero-trust security. At a high level, zero trust (or “ZT” for the cool kids) shifts defenses from traditional, network-based perimeters to focus on users, assets and behaviors. Zero trust, as the name implies, assumes there is no implicit trust granted to users or devices.
I’m sharing this because I think it’s very timely, as enterprises are still in various stages of adoption. In a recent report, Gartner predicted that over 60% of organizations will embrace zero trust as a starting point for security by 2025; however—and to me this is…
The post How to Trust No One in Just Four Steps appeared first on Interconnections - The Equinix Blog.
- Cyber Security
- Distributed Security
- Zero Trust