add_header X-Frame-Options "SAMEORIGIN";

Zero trust is changing the cyber landscape

General news | Security | Zscaler Security
March 7, 2022

BMW Driving Experience in:

Day(s)

:

Hour(s)

:

Minute(s)

:

Second(s)

The modern workplace is undergoing a metamorphosis. The focus on the corporate network has decreased as businesses’ reliance on the internet has increased. Thanks to the pandemic, which has made remote working the new norm. As a result, the attack surface for cybercriminals has expanded.

The Attack Surface
Research into the state of the attack surface of companies, based on global data collected between February 2020 and April 2021, shows that the attack surface has grown as remote working has been made possible. The report indicates that EMEA leads the Americas and APAC region in terms of overall exposure, with an average of 283 exposed servers and 52 exposed cloud instances.

Trusted
Of all the cybersecurity trends and buzzwords of recent years, zero trust has arguably the potential to have the most significant impact on the cyber landscape. In essence, zero trust revolves around the idea that, whether inside or outside the network, nothing should be trusted just like that. Everything is guilty until proven innocent, and everything must be inspected to prove the level of innocence.

Zero Trust
An essential principle for zero trust is that companies should reduce what they show on the internet. Take an expense tracking system for a large company. The team creates a login portal on the internet, and only those with the correct login details can access it. However, the portal is presented and accessible to everyone on the web, not just those who want to use it with the right intention.

VPN
Even a VPN, used to access applications on the internal network, has an interface that is open to attack. VPN attacks are a severe problem. In October 2020, the NSA released a list of the top 25 security vulnerabilities exploited by Chinese hackers. VPNs and remote desktop protocols (RDPs) make up half of that list.

Do you want to know more about this topic? Read Zscaler’s full article on computable.nl.