Attackers to target vulnerabilities not covered by zero trust 

Share post:

Gartner predicts that owing to the growing enterprise attack surface, more than half of cyber threats will target vulnerabilities that zero trust controls do not cover or cannot mitigate.

According to the prediction, by 2026, 10% of large enterprises will have a mature and measurable zero-trust program. But most importantly, he zero-trust approach to security will only minimize potential threat and make successful attacks less harmful, but companies should not expect zero-trust guidelines to be easy to implement or to prevent most attacks.

Gartner says that zero trust adoption is slow, and threat actors are shifting their focus to areas other than zero trust coverage. It goes on to say that while most organizations were considering zero trust, only a few had fully implemented zero trust.

Exploiting vulnerabilities in software and hardware, as well as using stolen or compromised credentials, could be used by hackers to circumvent zero trust protections. Threat actors may also conduct spear-phishing campaigns aimed at specific individuals, gain physical access to devices and network infrastructure, and use malware or other malicious software to gain access to systems and data.

In the end, Gartner recommends that chief information security officers (CISOs) chief information security officers (CISOs) and risk assessment chiefs should create an efficient zero-trust tactic which helps balance the need for safety with the requirement to run the business. Furthermore, organization should develop zero trust first in order to secure the most critical assets with the highest return on risk mitigation.

The sources for this piece include articles in CPOMagazine and Datacenterknowledge.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Google Play introduces new biometric verification with a user warning

Google has recently announced updates to the biometric verification process for Google Play purchases, aiming to bolster security...

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Cyber Security Today, April 19, 2024 – Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more

This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international

Controversial expansion of US surveillance powers nears Senate vote

The US Senate is poised to vote on a significant expansion of Section 702 of the Foreign Intelligence...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways