How to Use a Zero-Trust Model to Secure Hybrid Workersby@ShannonFlynn
987 reads
987 reads

How to Use a Zero-Trust Model to Secure Hybrid Workers

by Shannon4mMarch 24th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Zero-trust was first introduced by Forrester in 2009 and was marketed as a viable alternative to traditional security architectures. At its core, zero-trust security assumes that every network, device, and user is compromised until it can be proven otherwise.  Hybrid work environments consist of some users working remotely and others working on site. This introduces wider surfaces for cybercriminals to attack, leaving organizations more vulnerable. Zero trust security principles maintain protection amid the IT complexities of these hybrid work environments.  Zero trust is a security network that requires users to authenticate, authorize and validate specific security configurations before accessing or maintaining access to data, applications, or software. Explicit verification assumed breaches and granting the least privileged access are some of the core purposes of zero-trust security. 

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - How to Use a Zero-Trust Model to Secure Hybrid Workers
Shannon HackerNoon profile picture
Shannon

Shannon

@ShannonFlynn

Share Your Thoughts

About Author

Shannon HackerNoon profile picture
Shannon@ShannonFlynn

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
L O A D I N G
. . . comments & more!