The Cybersecurity hazard is at an all-time high due to several changes in the business environment. The proliferation of personal devices and the adoption of the hybrid work model and digital technologies are creating multiple vulnerable nodes that are exposed to security breaches.
Organisations and their CISOs are challenged by the evolving threat landscape. The need for strategic thinking and rehashing the fundamental security architecture construct is much higher than ever. In this context, the Zero Trust Security Architecture is one approach that’s increasingly getting a lot of traction. At a higher level, Zero Trust assumes that your business is continuously compromised, and the architecture aims to mitigate that.
SECURITY FROM A DIFFERENT PERSPECTIVE
Fundamentally, cyber security is a risk management function where we need to make decisions on tradeoffs or risk acceptance when we implement controls. It is difficult to imagine a world where we would only have absolute control. Another important factor to note is that trust is contextual. The security world has built various models and solutions for adaptive controls or transparent controls. These models are based on answering questions about who, where, why, when and what of a transaction before any verification, approval or denial is made.
Security architecture has always relied on trust models. There are many technical controls that we trust before we grant or deny access to resources. For all this to work properly, security teams must ensure the highest degree of integrity to handshakes or trust.
This story is from the May,2023 edition of Voice and Data.
Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 9,000+ magazines and newspapers.
Already a subscriber ? Sign In
This story is from the May,2023 edition of Voice and Data.
Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 9,000+ magazines and newspapers.
Already a subscriber? Sign In
Can US AI copyright law impact Indian policymaking?
The proposed Act suggests compensating original creators for content that is used to train Gen Al. This can be a good middle ground for many in tech to follow
Rise of the connected cars
Advanced features like 5G, IoT, and AI are reshaping the automotive industry in India, promising enhanced mobility and safety for drivers
Navigating chaos: Securing trust in digital communication
Amid rising fraud risks, CPaaS tools offer a lifeline. SMS, though vulnerable, remains pivotal for real-time alerts in a chaotic digital landscape
The silent communication warhorse
While 5G grabs the headlines, 4G LTE quietly fuels global mobile networks, enabling high-speed Internet and IoT growth with wide adoption and growth potential
HPE Launches Wi-Fi 7 APs for enhanced connectivity and security
Hewlett Packard Enterprise launched Wi-Fi 7 access points (APs), boasting up to 30% more wireless traffic capacity than competitors.
Getting ready for the great Indian switch
India's mobile landscape is undergoing a shift: from feature phones to feature-rich, affordable smartphones, driven by consumers' desire for a better user experience
Net neutrality takes a right turn again
Led by Biden's commitment to protecting the Open Internet, the recent FCC decision has brought the Net Neutrality debate back to the front
It is time to ghost the AI dating bots
As mobile apps and AI dating bots surge in popularity, addressing pressing concerns about privacy, data manipulation, and transparency is paramount
Will voice interfaces ever take off?
Voice as a primary user interface has shown flickers of promise but has never taken off. Today, with AI at hand, it is still failing to go mainstream
Mega deals paper some cracks for in-turmoil IT firms
Amid the tricky financial year 2023-24, IT firms saw losses in Pack revenue from their telecommunications clients-suggesting that a rejig could be in order