Don't trust anyone: zero trust
With the increasing threat landscape and increased demands on data security, the zero trust security model has gained significantly in popularity among companies. Most traditional approaches to network security focus on strong protections against unauthorized access. Their weakness, however, is the trust that users and entities automatically enjoy as soon as they are in the network. If cybercriminals succeed in gaining access to the network, there is often very little that prevents them from moving freely there and smuggling sensitive data out. The zero trust concept therefore suggests that all access be blocked ...