Attackers to target vulnerabilities not covered by zero trust 

Share post:

Gartner predicts that owing to the growing enterprise attack surface, more than half of cyber threats will target vulnerabilities that zero trust controls do not cover or cannot mitigate.

According to the prediction, by 2026, 10% of large enterprises will have a mature and measurable zero-trust program. But most importantly, he zero-trust approach to security will only minimize potential threat and make successful attacks less harmful, but companies should not expect zero-trust guidelines to be easy to implement or to prevent most attacks.

Gartner says that zero trust adoption is slow, and threat actors are shifting their focus to areas other than zero trust coverage. It goes on to say that while most organizations were considering zero trust, only a few had fully implemented zero trust.

Exploiting vulnerabilities in software and hardware, as well as using stolen or compromised credentials, could be used by hackers to circumvent zero trust protections. Threat actors may also conduct spear-phishing campaigns aimed at specific individuals, gain physical access to devices and network infrastructure, and use malware or other malicious software to gain access to systems and data.

In the end, Gartner recommends that chief information security officers (CISOs) chief information security officers (CISOs) and risk assessment chiefs should create an efficient zero-trust tactic which helps balance the need for safety with the requirement to run the business. Furthermore, organization should develop zero trust first in order to secure the most critical assets with the highest return on risk mitigation.

The sources for this piece include articles in CPOMagazine and Datacenterknowledge.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways