Week 3: Zero Trust in Cybersecurity
Zero Trust is one of the newer ways of thinking in cybersecurity, and in all honesty, reasonably so. Instead of assuming everything inside a network is safe, the idea of Zero Trust is that you should never automatically trust anything. Whether that be the users, the devices connected to the network, or even the applications you use. The article I read today, and learned this information from, is called CrowdStrike, and they break it down well by explaining that implementing this model comes with a lot of perks. Implementing this mindset means constantly checking systems, stricting access control, and implementing the least privilege principle to keep systems secure. Now that many companies are switching to working remotely and having data in the cloud, relying on just firewalls to be the last barrier to your data is not enough anymore. Implementing Zero Trust ensures that when working with systems, to never trust the system and always verify instead of trusting the system, but still verifying. It is always a good idea to be cautious when it comes to ensuring the security of data.
Source:
“What Is Zero Trust? - Guide to Zero Trust Security.” CrowdStrike, www.crowdstrike.com/en-us/cybersecurity-101/zero-trust-security/. Accessed 3 June 2025.
Comments
Post a Comment