Zero Trust Architecture Avert Five Major Cyberattacks A Year

Share post:

Leaders who have adopted a zero-trust architecture thwart five major cyberattacks a year, according to cybersecurity firm Illumio.

Zero Trust is a security framework that requires that all users, whether inside or outside the corporate network, are authenticated, authorized, and continuously validated for security configuration before accessing applications and data.

66% of companies say they have experienced at least one attack on the software supply chain in the last two years. As these numbers continue to rise, IT decision makers continue to rely on zero trust security as a pillar of the security framework moving forward.

90% of the 1,000 IT and security experts surveyed state that the further development of zero trust strategies is one of their top three security priorities in 2022. Zero trust strategies are important to them in order to improve their readiness in case of a cyberattack.

“Money will not make the problem go away until security leaders move beyond the legacy approach to only focus on detection. Zero Trust Segmentation is emerging as a true market category that is transforming business operations and strengthening cyber resiliency,” said PJ Kirner, Illumio co-founder and CTO.

The sources for this piece include an article in TechRepublic.

SUBSCRIBE NOW

Related articles

Hamilton Estimates $52 Million to Rebuild IT Systems After Ransomware Attack

The city of Hamilton plans to spend $52 million over the next three years to rebuild and secure...

Avery Data Breach: Credit Card Skimmer Affects Over 61,000 Customers

Label maker Avery has disclosed a data breach affecting 61,193 customers, caused by a credit card skimmer that...

Scammed Company Ordered to Pay $190k for Fraudulent Invoice Payment

A hacker gained access to Mobius Group’s email system and sent instructions from a legitimate email address, directing...

Sneaky 2FA: A Sophisticated Attack Defeats Both 2FA and Phishing Protections

A new phishing kit, ominously named "Sneaky 2FA," has emerged, targeting Microsoft 365 users by bypassing two-factor authentication...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways