A zero-trust journey through the threat landscape

被引:0
|
作者
Trott D. [1 ]
机构
[1] Orange Cyberdefense
关键词
D O I
10.12968/S1353-4858(24)70008-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Zero trust is being widely adopted as a fundamental concept in cyber security architectures, and its implementation has accelerated due to so many organisations introducing new working practices. But creating a zero-trust environment is not simple, and requires a shift in mindset away from thinking about security in terms of fixed lines of defence. And it's not just a change in technology – it requires you to look deeply at your processes and corporate culture, too. So what are the best ways of embarking on the zero-trust journey? © 2024 MA Business Ltd
引用
下载
收藏
相关论文
共 50 条
  • [41] Zero-Trust Enabling Intrusion Detection Protection for Software Defined Vehicles
    Kaster, Robert
    Ma, Di
    2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [42] Decentralized Edge Collaboration for Seamless Handover Authentication in Zero-Trust IoV
    Fang H.
    Zhu Y.
    Zhang Y.
    Wang X.
    IEEE Transactions on Wireless Communications, 2024, 23 (08) : 1 - 1
  • [43] A Zero-Trust Approach for Cooperative Vehicular Networks: A Motorway Use Case
    Dawson, Ben
    Malazi, Hadi Tabatabaee
    Kazmi, Aqeel
    Chaudhry, Saqib Rasool
    IEEE Systems, Man and Cybernetics Magazine, 2025, 11 (01): : 11 - 22
  • [44] Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture
    Xu, Mingyang
    Guo, Junli
    Yuan, Haoyu
    Yang, Xinyu
    ELECTRONICS, 2023, 12 (04)
  • [45] A continuous authentication scheme for zero-trust architecture in industrial internet of things
    Wan, Tao
    Shi, Buhai
    Wang, Huan
    Alexandria Engineering Journal, 2025, 122 : 555 - 563
  • [46] A New Zero-Trust Aided Smart Key Authentication Scheme in IoV
    Song, Yangxu
    Jiang, Frank
    Ali Shah, Syed Wajid
    Doss, Robin
    2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2022, 2022, : 630 - 636
  • [47] Integrative Federated Learning and Zero-Trust Approach for Secure Wireless Communications
    Asad, Muhammad
    Otoum, Safa
    IEEE WIRELESS COMMUNICATIONS, 2024, 31 (02) : 14 - 20
  • [48] ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology
    Gutmann, Andreas
    Renaud, Karen
    Maguire, Joseph
    Mayer, Peter
    Volkamer, Melanie
    Matsuura, Kanta
    Mueller-Quade, Jorn
    1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 357 - 371
  • [49] Poster: Toward Zero-Trust Path-Aware Access Control
    Seaton, Joshua H.
    Hounsinou, Sena
    Wood, Timothy
    Xu, Shouhuai
    Brown, Philip N.
    Bloom, Gedare
    PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, : 267 - 269
  • [50] Applying the principles of zero-trust architecture to protect sensitive and critical data
    Greenwood D.
    Network Security, 2021, 2021 (06) : 7 - 9