This is a preview for the SCMedia ebook Finding the way to zero trust.Zero trust signals a monumental shift in how organizations secure their data, assets, and users. But as reported in a new survey by CRA Business Intelligence, many companies believe they lack the resources in time, funding and expertise to implement zero trust policies at the enterprise level.While no company’s journey to zero trust will look exactly the same, our research team has provided a few practices and tips that can help organizations move the zero trust goalposts forward.
Daniel Thomas is a technology writer, researcher, and content producer for CyberRisk Alliance. He has over a decade of experience writing on the most critical topics of interest for the cybersecurity community, including cloud computing, artificial intelligence and machine learning, data analytics, threat hunting, automation, IAM, and digital security policies. He previously served as a senior editor for Defense News, and as the director of research for GovExec News in Washington, D.C..
Mounting cybersecurity threats against operational technology networks stemming from the growing interconnectedness of industrial systems have prompted the Cybersecurity and Infrastructure Security and other federal agencies to issue joint guidance on implementing zero trust across OT systems, reports Infosecurity Magazine.