‘Zero Trust’ refers to a cybersecurity defence model that refuses trust to any user, system, or service operating from within an organization’s security perimeter.

Instead, it attempts to verify everyone and anything trying to access a network resource. In times past, the zero-trust model seemed extreme. Now, organizations are adopting a ‘zero trust’ approach security model as enterprise security standards increase imminently. The risk of threats inside organizations means that a sensible business cannot afford the luxury of trust.

Like other model, zero-trust has its own need for improvement. Matthew Gyde, Group Executive – Cybersecurity at Dimension Data has noted that in some instances the zero-trust model hinders the productivity of employees, making it difficult to implement. We see the zero-trust model evolving into ‘digital trust’.

Digital trust involves combining threat intelligence tools with internal authentication. Automated threat seekers search for fraudulent or compromised user credentials on the dark web, alerting the organization that the user is no longer to be trusted. Information security teams can then reset the compromised account, and reinstate an accurate version of the user’s digital fingerprint.

Any questions… feel free to reach out to me via [email protected] or in a comment below.

Cheers!

Dan Duran – CTO – Rhyno Cybersecurity

About Rhyno Cybersecurity

Here at Rhyno, we work seamlessly with company leaders and their staff, helping to bridge internal divides that can weaken an organization’s security framework.