Zero Trust Architecture Avert Five Major Cyberattacks A Year

Share post:

Leaders who have adopted a zero-trust architecture thwart five major cyberattacks a year, according to cybersecurity firm Illumio.

Zero Trust is a security framework that requires that all users, whether inside or outside the corporate network, are authenticated, authorized, and continuously validated for security configuration before accessing applications and data.

66% of companies say they have experienced at least one attack on the software supply chain in the last two years. As these numbers continue to rise, IT decision makers continue to rely on zero trust security as a pillar of the security framework moving forward.

90% of the 1,000 IT and security experts surveyed state that the further development of zero trust strategies is one of their top three security priorities in 2022. Zero trust strategies are important to them in order to improve their readiness in case of a cyberattack.

“Money will not make the problem go away until security leaders move beyond the legacy approach to only focus on detection. Zero Trust Segmentation is emerging as a true market category that is transforming business operations and strengthening cyber resiliency,” said PJ Kirner, Illumio co-founder and CTO.

The sources for this piece include an article in TechRepublic.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 20, 2024 -Ransomware gang claims it hit a Canadian internet provider

A ransomware gang claims it hit a Canadian internet provider. Welcome to Cyber Security Today. It's Monday May 20th,...

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways