• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Wednesday, August 10, 2022

  • Subscribe

SDxCentral

SDxCentral

The Leading Resource on Next-Generation IT Infrastructure

  • News
  • Analysis
  • Interviews
  • Opinion
  • Podcasts
  • Definitions
  • Glossary
  • Demos
  • Webinars
  • Companies
  • Careers
  • SECURITY14
    • CYBERATTACKS
    • DATA BREACHES
    • MALWARE
    • RANSOMWARE
    • THREATS
    • VULNERABILITIES
  • ZERO TRUST
    • AUTHENTICATION
    • DATA SECURITY
    • ENCRYPTION
    • XDR
  • SASE3
  • SD-WAN3
  • EDGE3
    • IOT
  • CLOUD5
    • HYBRID CLOUD
    • CLOUD NATIVE
    • CLOUD SECURITY
    • CLOUD SERVICES
    • CONTAINERS
    • DEVOPS
    • KUBERNETES
    • MICROSERVICES
    • OPEN SOURCE
    • PRIVATE CLOUD
    • PUBLIC CLOUD
    • SERVERLESS
  • DATA CENTER1
    • COMPOSABLE
    • HCI
    • SILICON
    • STORAGE
    • VDI
  • NETWORK3
    • FABRICS
    • INTENT BASED NETWORKING
    • MACHINE LEARNING
    • MONITORING
    • NETWORK SECURITY
    • PERFORMANCE MANAGEMENT
    • TELECOM & NFV
  • 5G8
    • NETWORK SLICING
    • SERVICE ASSURANCE
  • RAN1
    • OPEN RAN
  • SUSTAINABILITY1
  • TOPICS
    • SECURITY
    • ZERO TRUST
    • SASE
    • SD-WAN
    • EDGE
    • CLOUD
    • DATA CENTER
    • NETWORK
    • 5G
    • RAN
  • CONTENT TYPES
    • News
    • ANALYSIS
    • INTERVIEWS
    • OPINION
    • GLOSSARY
    • PODCASTS
    • DEFINITIONS
    • DEMOS
    • WEBINARS
    • COMPANIES
    • CAREERS

Articles / News

Zero Trust Is More Important Than Ever, Security Practitioners Warn

 Placeholder Image
Nancy Liu | Editor January 7, 2022 4:12 pm MT
Share this article:
Email Twitter LinkedIn Facebook Reddit Hacker News
Zero Trust Is Crucial Now More than Ever, Security Practitioners Warns Placeholder Image

As cyberattacks continue to ramp up and grab bigger and bigger headlines, implementing a zero-trust strategy is more important than ever, cybersecurity practitioners warn.

Ransomware, malware, and phishing attacks exploded last year, highlighting the need for zero-trust strategies, Jim Taylor, chief product officer at SecurID, told SDxCentral.

2021 began with cybersecurity practitioners quashing fires in the aftermath of the massive SolarWinds hack and ended with the disclosure of the Log4j vulnerability.

“Both show that the problem as we know it is changing. The environment that we have to protect is fundamentally different than what it was 10 years ago,” Taylor wrote in response to questions. “We need a new architecture to protect it.”

Zero trust is the “​​appropriate architecture to strive for,” particularly when the work model has changed and attacks have evolved to circumvent the traditional perimeter-based network controls that most organizations have relied on, he added.

Cloudflare Field CTO John Engates also expects “zero trust will become a non-negotiable for enterprise” this year. He also predicts “companies of all sizes will increasingly adopt zero trust to secure their networks and applications, and staffing and supply-chain shortages will pressure IT departments to trade deploying and managing boxes for security-as-a-service models.”

These predictions match recent security-spending trends, which found enterprises are investing heavily in zero-trust enabling technologies in response to ransomware threats, a recent Dell’Oro Group report found.

“Interest in zero trust has exploded due to the numerous high-profile security attacks in the recent past that have shown the inadequacy of the legacy perimeter network architecture, particularly for the remote-user use case,” Mauricio Sanchez, research director of network security at Dell’Oro Group, told SDxCentral in an earlier interview.

However, the zero-trust adoption rate remains low. Only 29% of security teams said they’d implemented a zero-trust architecture when asked how they protect against ransomware, a recent report by Cybersecurity Insiders and Forcepoint’s Bitglass.

Zero Trust Isn’t a Tool, It’s a Strategy

The low adoption rate might reflect the fact that many organizations still don’t fully understand what zero trust means or how to implement it. 

“The term zero trust tends to be misused or misinterpreted to fulfill the agenda of vendors looking to make their solutions more attractive and compelling,” Riccardo Galbiati, cyber advisor at Palo Alto Networks, wrote in a blog post late last year.

Service providers might list zero-trust network access (ZTNA), software-defined perimeters (SDP), or identity-defined perimeters (IDP) products as silver bullets of a zero-trust architecture without pursuing a zero-trust strategy for the whole enterprise, so “we need to strategically remove implicit trust from IT systems and constantly validate every digital interaction in the process,” he wrote. 

“Zero trust can be frothy—it’s a term that marketers love to throw around, so organizations are right to be skeptical when they’re promised zero trust,” Taylor echoed. Zero trust is “not a product. It’s not a set of practices. It’s a way of thinking,” and the core tenet of it is “never trust, always verify.”

He argues organizations should start with figuring out how to verify their users and understand what they should have access to. Meanwhile, Galbiati encourages organizations to approach zero trust with “a strategic mindset, instead of technology adoption.” 

In this way, “all the issues and misunderstandings around its nature are bound to disappear, and the ultimate goal of cybersecurity — maintaining business continuity in spite of cyberattacks — becomes a realistic and achievable outcome,” Galbiati concluded.

Read Next

  • Chris Krebs: Cybersecurity Will be ‘Near-Term Bearish, Long-Term Bullish’
    News | Nancy Liu | August 10, 2022
  • 7 Layers: Verizon Business Bullish on NaaS, MEF Support
    7 Layers (16:48) | Dan Meyer | August 10, 2022
  • Weekly Cyberattacks Peak in Q2, Check Point Finds
    Analysis | Mikayla Gruber | August 10, 2022
  • CrowdStrike Adds AI to Indicators of Attack Detection
    News | Nancy Liu | August 10, 2022
  • Cybereason Lets You Manage Cyberthreats on Your Phone 
    News | Nancy Liu | August 10, 2022

sidebar

Related Resources

Popular News

  • 1
    SDxCentral 2-Minute Weekly Wrap: Microsoft Bests Amazon as top Public Cloud Placeholder Image
    Microsoft Bests Amazon as Top Public Cloud, IDC Reports
  • 2
    VMware Fits SASE, NSX, Carbon Black Into Its Multi-Cloud Push Placeholder Image
    VMware Fits SASE, NSX, Carbon Black Into Its Multi-Cloud Push
  • 3
    Shift-Left Security Fails to Protect APIs, Salt Security Finds Placeholder Image
    Shift-Left Security Fails to Protect APIs, Salt Security Finds

Top Related Videos

  • 1
     Placeholder Image
    38:53
    How to Speak to the Board About Cloud Security
  • 2
     Placeholder Image
    A Deloitte Fireside Chat: ZTNA in a Post-Pandemic World
  • 3
     Placeholder Image
    Futureproof Your Business With ZTNA 2.0

Trending Companies

  • Amazon Web Services (AWS)
  • Microsoft
  • VMware
  • Cisco
  • Fortinet
  • Ericsson
  • Broadcom
  • VeloCloud

Informative Webinars

  •  Placeholder Image
    29:55
    How to Deliver a Seamless Home Office Experience from Anywhere
  • Powering SD-WAN, Network Edge and More With ngena Cloud Placeholder Image
    20:06
    Powering SD-WAN, Network Edge and More With ngena Cloud
  • Minimize the Attack Surface of Your Network by Creating an Automated, Multi-Vendor OS Upgrade Placeholder Image
    12:10
    Minimize the Attack Surface of Your Network by Creating an Automated, Multi-Vendor OS Upgrade

Profiled Partner Advice

Zero Trust and the Power of Isolation for Threat Prevention Placeholder Image

Presented by Menlo Security

Download Now

Join Now!

Sponsored Content

 Placeholder Image

Aruba Demo Series: Shift to a Business-First Networking Model

 Placeholder Image

How to Deliver a Seamless Home Office Experience from Anywhere

Powering SD-WAN, Network Edge and More With ngena Cloud Placeholder Image

Powering SD-WAN, Network Edge and More With ngena Cloud

 Placeholder Image

ZTNA 2.0: Secure Access for a Hybrid World

Latest from SDxCentral

  • Ex-CISA Chief: Cybersecurity Will be ‘Near-Term Bearish, Long-Term Bullish’ Placeholder Image
    Chris Krebs: Cybersecurity Will be ‘Near-Term Bearish, Long-Term Bullish’
    News | Nancy Liu | August 10, 2022

    Krebs noted the four main factors are technology, threat actors, government, and the people.

  • The ‘Blind Audition’ of Engineering Placeholder Image
    The Blind Audition of Software Engineering
    Interview | Tommy Clift | August 10, 2022

    Hiring platform company Turing uses their Talent Cloud to automatically source, vet, and manage engineers and developers across the globe based on on skills, roles, and career trajectories. 

  • 7 Layers: Verizon Business Bullish on NaaS, MEF Support Placeholder Image
    7 Layers: Verizon Business Bullish on NaaS, MEF Support
    7 Layers (16:48) | Dan Meyer | August 10, 2022

    "What that really means is it's making the network more like a cloud service, which means it's dynamic," Verizon Business' Debika Bhattacharya explained.

  • Oracle Scores AT&T Cloud Renewal Placeholder Image
    Oracle Scores AT&T Cloud Renewal
    News | Dan Meyer | August 10, 2022

    AT&T will tap Oracle's Fusion Cloud Enterprise Resource Planning, Fusion Cloud Customer Experience, and Cloud Infrastructure platforms.

  • Weekly Cyberattacks Peak, ‘No Single Silver-Bullet’ Solution, Check Point Finds Placeholder Image
    Weekly Cyberattacks Peak in Q2, Check Point Finds
    Analysis | Mikayla Gruber | August 10, 2022

    “There is no single silver-bullet technology that can protect from all threats and all threat vectors,” Check Point Research noted.

Footer

Coverage

  • Cloud HQ
  • Data Center HQ
  • Edge HQ
  • 5G HQ
  • Network HQ
  • RAN HQ
  • SASE HQ
  • SD-WAN HQ
  • Security HQ
  • Zero Trust HQ

Content

  • All Resources
  • Analysis
  • Careers
  • Companies
  • Definitions
  • Demos
  • Glossary
  • Interviews
  • News
  • Newsletters
  • Opinion
  • Podcasts
  • Webinars

Account

  • Become a Member
  • Subscribe
  • Manage My Profile
  • Manage My Subscriptions
  • Manage My Notifications
  • Saved Content

Work With Us

  • Advertising
  • Content
  • Demand Generation
  • Hubs
  • Webinars

Company

  • Company
  • Editorial Team
  • Job Openings
  • Leadership
  • Marketing Resource Center
  • Partners
  • Contact Us
Follow Us: Twitter LinkedIn Facebook Podcasts RSS
SDxCentral

© 2022 SDxCentral, LLC

  • Terms of Use
  • Privacy Policy
  • Cookie Policy
  • Do Not Sell My Personal Information
SDxCentral

We use cookies to ensure you get the best experience on our website.

Cookie Settings

SDxCentral employs cookies to improve your experience on our site, to analyze traffic and performance, and to serve personalized content and advertising relevant to your professional interests. You can manage your preferences at any time. View our Privacy Policy for more information.

  • Necessary and Functional Cookies - These cookies are necessary for the Site to function and cannot be switched off in our systems. These are used to let you login and to and ensure site security. Without these cookies, our Services won't work properly or won't be able to provide many features and functionality.

  • Performance & Tracking Cookies - We use our own and 3rd party analytics and targeting cookies to collect and process certain analytics data, including to compile statistics and analytics about your use of and interaction with the Site along with other Site traffic, usage, and trend data which is then used to target relevant content and ads on the Site. Opting out of these cookies may impact some minor site functions.