A zero-trust journey through the threat landscape

被引:0
|
作者
Trott D. [1 ]
机构
[1] Orange Cyberdefense
关键词
D O I
10.12968/S1353-4858(24)70008-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Zero trust is being widely adopted as a fundamental concept in cyber security architectures, and its implementation has accelerated due to so many organisations introducing new working practices. But creating a zero-trust environment is not simple, and requires a shift in mindset away from thinking about security in terms of fixed lines of defence. And it's not just a change in technology – it requires you to look deeply at your processes and corporate culture, too. So what are the best ways of embarking on the zero-trust journey? © 2024 MA Business Ltd
引用
下载
收藏
相关论文
共 50 条
  • [21] Identity authentication for edge devices based on zero-trust architecture
    Liu, Haiqing
    Ai, Ming
    Huang, Rong
    Qiu, Rixuan
    Li, Yuancheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23):
  • [22] Zero-trust based dynamic access control for cloud computing
    Ri Wang
    Chen Li
    Kun Zhang
    Bibo Tu
    Cybersecurity, 8 (1)
  • [23] Securing fog computing in healthcare with a zero-trust approach and blockchain
    Navjeet Kaur
    Ayush Mittal
    Umesh Kumar Lilhore
    Sarita Simaiya
    Surjeet Dalal
    Kashif Saleem
    Ehab Seif Ghith
    EURASIP Journal on Wireless Communications and Networking, 2025 (1)
  • [24] A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing
    Ali, Belal
    Hijjawi, Simsam
    Campbell, Leith H.
    Gregory, Mark A.
    Li, Shuo
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [25] A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT
    Tian, Minqiu
    Li, Zifu
    Li, Fenghua
    Cao, Jin
    Guo, Chao
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 299 - 306
  • [26] Identity authentication for edge devices based on zero-trust architecture
    Liu, Haiqing
    Ai, Ming
    Huang, Rong
    Qiu, Rixuan
    Li, Yuancheng
    Concurrency and Computation: Practice and Experience, 2022, 34 (23)
  • [27] Exploiting blockchain for dependable services in zero-trust vehicular networks
    Hao, Min
    Tan, Beihai
    Wang, Siming
    Yu, Rong
    Liu, Ryan Wen
    Yu, Lisu
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (02)
  • [28] Exploiting blockchain for dependable services in zero-trust vehicular networks
    Min Hao
    Beihai Tan
    Siming Wang
    Rong Yu
    Ryan Wen Liu
    Lisu Yu
    Frontiers of Computer Science, 2024, 18
  • [29] eZTrust: Network-Independent Zero-Trust Perimeterization for Microservices
    Zaheer, Zirak
    Chang, Hyunseok
    Mukherjee, Sarit
    Van der Merwe, Jacobus
    SOSR '19: PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON SDN RESEARCH, 2019, : 49 - 61
  • [30] A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures
    Federici, Fabio
    Martintoni, Davide
    Senni, Valerio
    ELECTRONICS, 2023, 12 (03)