GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Zero Trust Privilege For Dummies

Cyber breaches are bigger and worse than ever. Hardly a day goes by without headlines about some new devastating cyber-attack. To better protect against data breaches, the use of a Zero Trust model has returned to the spotlight and seen huge growth in adoption. Instead of using the traditional approach of “trust, but verify,” the Zero Trust model implements “never trust, always verify” as its guiding principle.

There are many starting points on the path to Zero Trust. However, all roads still lead to identity, and access controls are the lowest-hanging fruit. Hackers don’t hack in anymore — they log in using weak, default, stolen, or otherwise compromised credentials. Indeed, Forrester Research estimates that 80 percent of today’s breaches involve privileged access abuse — that is, user accounts that have administrative access to critical systems in the organization. So, until organizations start implementing identity-centric security measures, privileged account compromise attacks will continue to provide a perfect camouflage for data breaches.

 

Interested in cybersecurity? Check out this GovWhitePapers blog post! You can also find events on cybersecurity on our sister site, GovEvents.

 

  • Author(s):
  • Lawrence Miller
  • Torsten George
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Zero Trust Privilege For Dummies
Format:
  • White Paper
Topics:
Published:August 1, 2020
License:Copyrighted
Copyright:© 2019 by John Wiley & Sons, Inc.

Featured Content

Contact Publisher

Claim Content

Stay Ahead of Government Policy Changes

Get exclusive access to the latest white papers, executive orders, and policy updates delivered to your inbox. Join 120K+ government professionals who rely on GovWhitePapers for critical intelligence.