Zero Trust to dominate 2023

Issue 1 2023 Information Security, Access Control & Identity Management

Hybrid work, the rise of the Internet of Things, and analysing data close to the edge mean traditional ways of safeguarding data are no longer sufficient. Zero Trust has emerged as a more proactive way for businesses to keep their systems, data, and networks protected against compromise.

The Zero Trust methodology sees no device, user, workload, or system trusted by default, regardless the location in which it is operating, whether inside or outside the perimeter. This will become pervasive in organisations, as more companies will move towards treating every employee and device as an island. Adopting a ‘never trust, always verify’ mindset is fast becoming one of the most effective forms of protection against compromise.

Beyond this, organisations will look at the means to further strengthen security in the cloud, and no longer only rely on service providers to keep data safe. The shared responsibility model will finally filter through mainstream businesses as decision-makers realise the importance of taking ownership of data security.

More fundamentally, companies will look at ways to enhance traditional firewall solutions. These are no longer the only reliable tools against increasingly sophisticated cybercriminals who are using machine learning, and artificial intelligence, to bypass traditional defences. Security by design, whether in the cloud or on-premises, becomes a crucial enabler for business protection.

Cybersecurity solutions that feature data loss prevention (DLP) can pre-emptively protect a business from unintentional loss of valuable and sensitive information. DLP helps safeguard sensitive data wherever it is going – from remote locations to the cloud or on-premises data centres. Of course, DLP solutions must be user friendly and have a high detection accuracy to ensure companies are protected both from known and unknown threats.

DLP tracks and controls any type or format of sensitive information in motion. This includes email, Web browsing, and file sharing services. Additionally, it educates and alerts users on how to properly handle data without getting IT or security teams involved. This saves valuable resources and improves the effectiveness of the cybersecurity environment.

When combining the likes of Zero Trust, cloud security, DLP, and advanced firewalling, 2023 will see the normalisation of managing the end user from a security perspective. Think of it as a geographical fence, isolating the people, devices, and applications that access critical back-end systems. The geographic location no longer matters. Zero Trust requires verification regardless, resulting in user management becoming critical to shoring up organisational defences.

While it might not happen this year, traditional architecture will eventually fall away, or adapt, as companies and individual users themselves embrace the cloud. Multi- and hybrid-cloud models will supplant many on-premises approaches resulting in a far more sophisticated cybersecurity landscape.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...