How to Use a Zero-Trust Model to Secure Hybrid Workersby@ShannonFlynn
985 reads

How to Use a Zero-Trust Model to Secure Hybrid Workers

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Zero-trust was first introduced by Forrester in 2009 and was marketed as a viable alternative to traditional security architectures. At its core, zero-trust security assumes that every network, device, and user is compromised until it can be proven otherwise.  Hybrid work environments consist of some users working remotely and others working on site. This introduces wider surfaces for cybercriminals to attack, leaving organizations more vulnerable. Zero trust security principles maintain protection amid the IT complexities of these hybrid work environments.  Zero trust is a security network that requires users to authenticate, authorize and validate specific security configurations before accessing or maintaining access to data, applications, or software. Explicit verification assumed breaches and granting the least privileged access are some of the core purposes of zero-trust security. 

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - How to Use a Zero-Trust Model to Secure Hybrid Workers
Shannon HackerNoon profile picture



Receive Stories from @ShannonFlynn

react to story with heart


. . . comments & more!