Sponsored By

Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know.

10 Ways to Avoid Zero-Trust Failure

Here are the prerequisites to have in order before getting past the zero-trust gate.

11 Slides

As cybercriminals run roughshod over enterprise environments using tried-and-true methods of credential theft, privilege escalation, and lateral movement across networks to find the high-value targets, zero-trust security principles look better by the day. Zero trust assumes no user is trusted and every point of access requires authorization. Zero trust takes the principle of least privilege to the next level by continuously validating users, devices, and services and only giving minimal access to what they need at any given time based on the risk profile of whatever it is they are touching.

It sounds simple, but it is exceedingly complex to pull off successfully. The good news is that there is a growing body of security professionals who have learned hard lessons on the do's and don’ts of zero-trust implementations. Here’s what they say newbies need to know before they even get out of the gate in order to avoid failure or delays in their transition to zero trust.

About the Author(s)

Ericka Chickowski, Contributing Writer

Contributing Writer, Dark Reading

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights