Identity at the core of Zero Trust
The ideas behind zero trust security architectures are not new but instead have continuously evolved since their inception in the early 2000s. When the ‘cyber kill chain’ is considered in terms of what the ‘bad guys’ get up to, the traditional idea of a corporate network perimeter is no longer effective.
Continue reading