Zero Trust – An Emerging Catchphrase in Cybersecurity



Zero trust has become a catchphrase in the cybersecurity sector, with all stakeholders fully accepting and going on all in. Adopting the next-generation security model has faced challenges due to confusion about what the term means. The rise of cyberattacks of all types, including ransomware, phishing, and business email compromise, indicates that something must change soon. It is a concept that seeks to create a shift in how organizations conceive. And build their networks and IT infrastructure. The older model of conceiving networks and IT infrastructure entailed putting all computers, servers. And devices in an organization on the same network and trusting each other. For example, a work computer would access team documents on a shared server or connect to a printer on the floor. Antivirus and firewalls are configure to consider everything outside the organization as wrong. Everything inside the network is not scrutinize. 

The explosion in cloud services, mobile devices, and remote work has radically challenged the old model. The old model was inherently flawed, with the lousy outside, good inside not as effective. Organizations are no longer physically able to control every device their employees use. The older model was always flawed since attackers would have the freedom. And trust of the network once they had slipped through the defensive parameters. 


To highlight the weaknesses of this older model, Google suffered a sophisticated state-sponsored attack eleven years ago against its corporate network. The hackers of Chinese origin and rampaged through Google’s networks stole data. And code and create backdoors that they would use to get in after getting kick out. The incident highlighted how networks build that didn’t make sense. It called for going back to the drawing board to rethink the design of networks. The battlefield was overhaul, making it difficult for attackers. The new design ensured that nothing trusts each other within a network. 


Zero trust demands that people using a network prove why they should be grante access. No more trusting of specific devices or connections that emanated from certain places. That means that people secured access into networks using corporate accounts with biometrics. And hardware security keys in addition to using usernames and passwords. Attackers impersonating other users would have no easy task gaining access to the network. Even if an attacker gains access to the network, the need-to-know or need-to-access basis applies. Third-party contractors wouldn’t have to tie your corporate account to the billing platform.

Zero trust advocates emphasize that it not a piece of software that you can install or just a box to check. It is a philosophy, a mantra, a concept, and a mindset. It is never a magic bullet or marketing gimmick or buzzword. 

Zero trust is a concept, not a simple action. You will be require to implement a set of measures, including device and software inventory, access control, and network segmentation. The confusion about the real meaning and purpose of its has made it difficult for people to implement the idea. 

The proponents of it agree on the overall goals and purpose. However, IT administrators and executives with so many other things to worry about can be misled. Or take shortcuts in implementing network security simply reinforcing the older approaches. Additionally, the industry needs to embrace greater integrity and improved communication. Especially with all the real threats and attacks facing organizations. 

According to Paul Walsh, founder, and CEO of MetaCert, a zero-trust-based anti-phishing firm, the security industry has added bells and whistles such as AI and Machine Learning to the same old methodology. It remains traditional security and not it no matter what you add. 


Cloud service providers are best placed to ingrain zero trust into their platforms and offer their customers the training and help them introduce zero trust concepts into their organizations. Phil Venables, the chief information security officer of Google Cloud, reports that they spend a lot of time explaining to their clients what zero trust is and how it can be applied in their Google Cloud and elsewhere in their networks. 

The other biggest obstacle to the widespread deployment of zero trust is that the network infrastructure in use was designed under the old model. Due to fundamental differences, the more aging network infrastructure offers no straightforward way to retrofit the newer zero trust concepts. The result is that implementing any zero trust ideas will potentially involve a significant investment and present a considerable inconvenience to re-design these legacy systems. That means zero trust projects are the least likely to be implemented by many organizations. Implementing zero trust may never happen in the federal government due to numerous legacy systems, an assortment of vendors, and the huge investments of time and money to overhaul the legacy systems. Government should focus on offering better security and improved user experience.

Security professionals’ ongoing efforts to hack organizations and discover their weaknesses to understand what it takes to break zero trust networks fully. For the most part, it is relatively easy to target segments of a targeted network that haven’t been upgraded with zero trust concepts. 


Businesses and organizations that decide to move their infrastructure off-premises and into the cloud with a trusted zero trust vendor can tighten some traditional attack paths. In conclusion, zero trust is not the panacea in the security sector. The zero-trust concept will strengthen an organization’s network but doesn’t make the network bullet-proofMisconfigurations may introduce weakness right from the onset of the transition to zero trust. 


Subscribe to our newsletter

Your emaill address should be use only for updating you on our articles, in the respect of the privacy law

Share post:

More like this

Blockchain scalability is a limit, how technologies solve the problem

In modern blockchain, scalability is a limit and is the main problem for meaningful planetary adoption. How technologies solve the problem

The State of Centralized and Decentralized Metaverse

The highlight of Meta's earnings announcement was the $3.7 billion loss from its Metaverse division in the third quarter. As a result, the loss from Metaverse investments for the year to date was $9.4 billion.

Important Performance Metrics for Decentralized Finance

In the world of DeFi, the price-to-sales ratio (P/S ratio) is a critical KPI. It is calculated by dividing the fully diluted market capitalization of the token by its 12-month revenue.

Augmented Reality and Virtual Reality: Key Differences

AR is already interesting for the pure design of the work instruction. For example, explanatory text can be dispensed with if images are enhanced with AR elements and short animations.