View all topics
Back to CompTIA

Using Zero Trust to battle email impersonation attacks

  • 3 mths ago

The Zero Trust model is founded on a simple concept, “trust no one and nothing.” Forrester notes Zero Trust “centers on the belief that trust is a vulnerability, and security must be designed with the strategy, ‘Never trust, always verify.’"

In practical terms, organizations that adopt the Zero Trust model put policies in place to verify everyone and everything, regardless of whether they are internal or external.

Though the Zero Trust approach has been around for more than a decade – first coined in 2009 by then Forrester Analyst John Kindervag – it hasn’t seen widespread adoption until very recently. 

Zero Trust has picked up steam and modernized many aspects of IT security. For example, while traditional VPNs certainly still provide fundamental protections when remotely connecting from a home to a corporate network, Zero Trust networks have taken telecommuter security to the next level – specifically addressing expanding and modern environments, such as cloud infrastructure, mobile devices and the internet of things (IoT).

Continue reading:

Reply Oldest first
  • Oldest first
  • Newest first
  • Active threads
  • Popular
Like1 Follow
  • 3 mths agoLast active
  • 6Views
  • 1 Following
Powered by Forumbee


View all topics