

TENDENCY TOWARDS USING A ZERO TRUST MODEL
Tendency to move away from the paradigm of "trusted networks" (like corporate networks where everybody in the company is on) to an identity-based authentication one, where users must authenticate at every step and get access only to the information that they need, i.e., zero trust model. This security fabric isolates and protects an organization’s most valuable network segments and protects against insider attacks. Organizations that do not deploy zero trust incurred an average USD 1 million greater breach costs compared to those with zero trust deployed. However, implementing zero trust principles and micro-segmentation is not an easy or short-term project, so organisations must start ASAP to incrementally adopt a zero-trust architecture.