The Zero Trust security framework turns 10 years old this year. It started as a simple concept: treat every user and all packets the same, as untrusted and potentially malicious.  

According to Forrester Research, which created the Zero Trust model, it has evolved from a focus on firewalls and data isolation to becoming a comprehensive, practical approach for security. While Zero Trust remains a strategic initiative, not a technology or tool, there are tools and technologies that enable it.

Today, continuous security management, has become a core concept of Zero Trust. Most entities on a network are not fully-managed, especially applications, and that’s created a potential security disaster.

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.