Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Redirecting the Zero Trust Conversation to Build a More Robust Architecture
  • Data Breach

Redirecting the Zero Trust Conversation to Build a More Robust Architecture

4 years ago Tim Erlin
Redirecting the Zero Trust Conversation to Build a More Robust Architecture

In a recent Tripwire survey, over 300 respondents from both private and public sectors said that implementing Zero Trust Architecture (ZTA) could materially improve cybersecurity outcomes. This result seems like a positive outcome since we don’t often get such a unanimously high confidence level in a specific security approach from survey data. No doubt, ZTA has the potential to fundamentally change the cybersecurity landscape, and a unified security perspective is something from which we could all benefit given the challenges at hand.

Nearly six months ago, the federal government put its stamp of approval on the Zero Trust security approach in Biden’s first Cybersecurity Executive Order. As architectures evolve and deadlines for agency implementation get closer, we felt it was important to offer reference models that could help agencies determine the best approach. We have done so in our latest guide, A Tripwire Zero Trust Reference Architecture. In the guide, we provide three evolutionary examples of a ZTA, including a reference architecture for Tripwire controls utilized within Zero Trust.

As I mentioned during a recent podcast, one of the tricky things about the term Zero Trust Architecture is that the word “architecture” implies a very well-defined object. In practice, Zero Trust is really a set of principles that are implemented partially in different ways. What’s most important is that all of the organizations trying to achieve some kind of ZTA are marching in the same general direction based on a core set of principles.

Arguably, the most foundational principle of any ZTA, and what I hear most often discussed in customer conversations, is how trust must be continuously verified for every person, device, or entity in a Zero Trust system. What I don’t often hear people discuss is how you maintain the trustworthiness of the systems involved in the architecture itself.

As a company built on the notion that integrity is foundational to cybersecurity, we aim to redirect the Zero Trust conversation toward system integrity. The controls that are provided through Tripwire’s products play a key role in achieving and maintaining system integrity and in ultimately creating a successful ZTA.

If you are a security practitioner responsible for implementing your organization’s Zero Trust strategy, there are two new guides I recommend you download: Building the Foundation of Zero Trust for Long Term Success, which outlines the core principles that determine the success of any Zero Trust implementation; and A Tripwire Zero Trust Reference Architecture, which provides a deeper look into the “how to’s” of building a more robust ZTA.

Read more ABOUT ZERO TRUST

Tripwire Experts Offer Point of View on Zero Trust at EO’s 6-Month Milestone

The post ” Redirecting the Zero Trust Conversation to Build a More Robust Architecture” appeared first on TripWire

Source:TripWire – Tim Erlin

Tags: Encryption, Goverment, High Severity, TripWire

Continue Reading

Previous Italy’s Antitrust Regulator Fines Google and Apple for “Aggressive” Data Practices
Next Ghidra 101: Binary Patching

More Stories

  • Data Breach

Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

10 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts

1 day ago [email protected] (The Hacker News)
  • Data Breach
  • Vulnerabilities

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

2 days ago [email protected] (The Hacker News)
  • Data Breach
  • Malware

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack

4 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

5 days ago [email protected] (The Hacker News)

Recent Posts

  • Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass
  • Block the Prompt, Not the Work: The End of "Doctor No"
  • Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures
  • 3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)
  • Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT