Increasing numbers of organisations are moving to a Zero Trust security model. The growing frequency and sophistication of cyber threats is driving the popularity of this model which takes a robust ‘never trust, always verify’ approach to security. The National Institute of Standards and Technology (NIST) defines a Zero Trust Architecture as: “an evolving set of cyber security paradigms that move defences from static, network-based perimeters to focus on users, assets, and resources. Zero Trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location.” The growth in popularity of…
Author: Henry Harrison
Within the enterprise, the web browser is the gateway for almost every business activity, providing access and control over critical data and services. As well as providing access to trusted systems and cloud services, the browser’s key role continues to be the access point to the wider internet. In most enterprises, the user can enable almost any website to send complex content for parsing and execution on their endpoint, but in most cases, neither the user nor the enterprise has any real knowledge about the website owner or about their security practices; they may have malicious intent, or the site…