Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsCyber Tactics ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Cyber Tactics

Zero trust further considered - another benefit of living in the times of AI

By John McClurg
SEC0720-Cyber-Feat-slide1_900px
SEC0720-cyber-slide2_900px
SEC0720-Cyber-Feat-slide1_900px
SEC0720-cyber-slide2_900px
July 1, 2020

Recent social distancing and sheltering-in-place regulations have, according to Gallup, resulted in a 57 percent increase in our remote workforce. The ramifications of these additional employees, working from home, portend a variety of workflow disruptions, including more opportunities for attackers to exploit vulnerabilities in home networks and devices as the means by which to gain access to corporate systems and data. In a hasty transition to working remotely, it is possible that essential security practices are being overlooked, leaving critical doors ajar through which malicious actors may enter.

The situation is complicated by the fact that traditional security best practices can be especially cumbersome, requiring users to spend hours reentering usernames and passwords and answering countless authentication questions. At the same time, most are now acknowledging that proper security posture is critical, the path to securing the remote workforce should also be seamless and experienced as a hassle-free balance between safety and a quality user-experience. It is pivotal to implement appropriate security practices, as inadequate measures can lead to unmanaged risks and the endangerment of corporate systems, data and employees.

Historically, organizations and employees have had to rely solely on username and password combinations – a process intended to ensure user trust. The harsh reality is that there are glaring deficiencies with the username/password combination paradigm. Even with the strongest password and multi-factor authentication (MFA) combinations in place, once an attacker has access to a user’s credentials, security defenses are essentially null and void.

What has been even more troublesome is the heavy dependence enterprise software systems have had on thousands of third-party elements, the security of which has been almost impossible to determine. A collateral challenge has been determining the probability that an attack will exploit a software vulnerability, install malware within enterprise systems and thereby facilitate the theft of user access credentials.

Organizations are deploying defense-in-depth to no avail, including MFA, firewall policies and deployment of encryption. Despite all this expense-in-depth, cyberattacks on enterprise data are still occurring at alarming rates. This is where Zero Trust comes into play. Enterprise trust has become a business problem, on top of an already taxing data security problem. Zero Trust systems support our aspirations to achieve minimal or zero touch strategies and relieve organizations from having to make the Sophie’s Choice between security and high-quality user experience.

Given the anemic performance of the past, Zero Trust arrives as a breath of fresh air, carrying with it no small confidence of finally being able to execute proper security postures that turns on its head any notion that users, devices and applications, interacting with the enterprise network, should automatically be trusted. Its implementation requires that all communications and interactions be relentlessly validated through continuous authentication.

Continuous authentication provides an ongoing risk measurement of all interactions at every point; it’s not a one-time vetting action or an individual MFA, but rather a constant, active process that takes all potential factors into account in a manner that ultimately only AI can support. This includes the consideration of user context and biometrics, continuously analyzing risk probability. In historical terms, Zero Trust by comparison is not intrusive nor disruptive to everyday users. It is only when an anomaly is detected that a user is asked to provide another authentication factor.

Zero Trust analyzes contextual and spatial data in real-time to create a simpler user experience, all while validating behavioral and locational circumstances. The resulting product is a risk score that informs policies for smart security and compliance postures. With risk scores in hand, organizations can determine the appropriate level of access that should be granted devices, users and applications.

Zero Trust’s ultimate goal is to enable users to work remotely – from home or anywhere else – and to engage effortlessly across systems, devices and data throughout the course of any given workday without compromising their organization’s security – or their own for that matter – becoming yet another benefit of living in the times of liberating AI and its associated math models.

KEYWORDS: COVID-19 cyber security endpoint security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security

    Reflections on 35 years in the trenches

    See More
  • cyber network

    The three main ingredients for the successful implementation of Zero Trust in the time of COVID-19: Machine learning, carta and software defined perimeter

    See More
  • Zero-trust-freepik

    Good-bye, trust-based security – WFH may usher in the age of zero trust

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing