A zero-trust journey through the threat landscape

被引:0
|
作者
Trott D. [1 ]
机构
[1] Orange Cyberdefense
关键词
D O I
10.12968/S1353-4858(24)70008-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Zero trust is being widely adopted as a fundamental concept in cyber security architectures, and its implementation has accelerated due to so many organisations introducing new working practices. But creating a zero-trust environment is not simple, and requires a shift in mindset away from thinking about security in terms of fixed lines of defence. And it's not just a change in technology – it requires you to look deeply at your processes and corporate culture, too. So what are the best ways of embarking on the zero-trust journey? © 2024 MA Business Ltd
引用
收藏
相关论文
共 50 条
  • [31] OZTrust: An O-RAN Zero-Trust Security System
    Jiang, Hao
    Chang, Hyunseok
    Mukherjee, Sarit
    Van der Merwe, Jacobus
    2023 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS, NFV-SDN, 2023, : 129 - 134
  • [32] Stability Analysis for Heterogeneous Vehicle Platoon in A Zero-Trust Environment
    Bao, Yibo
    Huang, Darong
    Na, Yuhong
    2023 2ND CONFERENCE ON FULLY ACTUATED SYSTEM THEORY AND APPLICATIONS, CFASTA, 2023, : 372 - 377
  • [33] The Usage of Clouds in Zero-Trust Security Strategy: An Evolving Paradigm
    Bartakke, Jyoti
    Kashyap, Rajeshkumar
    JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2024, 48 (01) : 149 - 165
  • [34] Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
    Tyler, Dan
    Viana, Thiago
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [35] Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams
    Sasada, Taisho
    Masuda, Yuto
    Taenaka, Yuzo
    Kadobayashi, Youki
    Fall, Doudou
    2021 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2021, : 24 - 31
  • [36] NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures
    Katsis, Charalampos
    Cicala, Fabrizio
    Thomsen, Dan
    Ringo, Nathan
    Bertino, Elisa
    CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 167 - 178
  • [37] A New Zero-Trust Aided Smart Key Authentication Scheme in IoV
    Song, Yangxu
    Jiang, Frank
    Shah, Syed Wajid Ali
    Doss, Robin
    2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
  • [38] Zero-trust design and assurance patterns for cyber-physical systems
    Hasan, Saqib
    Amundson, Isaac
    Hardin, David
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 155
  • [39] A Zero-Trust Satellite Services Marketplace Enabling Space Infrastructure as a Service
    Falco, Gregory
    Gordon, Nathaniel G.
    IEEE ACCESS, 2024, 12 : 71066 - 71075
  • [40] Correction: Securing fog computing in healthcare with a zero-trust approach and blockchain
    Navjeet Kaur
    Ayush Mittal
    Umesh Kumar Lilhore
    Sarita Simaiya
    Surjeet Dalal
    Kashif Saleem
    Ehab Seif Ghith
    EURASIP Journal on Wireless Communications and Networking, 2025 (1)