Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Good-bye, trust-based security – WFH may usher in the age of zero trust

By Aamir Lakhani
Zero-trust-freepik
July 6, 2021

The X-Files had it right – trust no one. The massive shift to remote work and a continually expanding attack surface has made the concept of trust-based security a naïve one at best, dangerous at worst. But the upshot is that everything we’ve seen and experienced in the past year has helped seed the need for a zero-trust based approach.

Let’s look at some of the major trends and factors of the past year (including the erosion of barriers between corporate and home offices and the expansion of targets) and how these risks can be mitigated using a zero trust approach.

 

Trust-based security has to go

The perimeter has expanded rapidly and dramatically in response to the pandemic, and cybercriminals have been quick to respond. Over the past years we have seen an uptick in attempts to exploit vulnerabilities in consumer networking and connected devices – in parallel with the transition to remote work. It’s probable that attackers are trying to disrupt the less than enterprise-grade security inherent in many of these devices now that they’re effectively part of the corporate perimeter.

That means employees could be gaining access to corporate resources from a compromised environment. It’s a new security model that many organizations are not familiar with. And due to this newly expanded attack vector—combined with overtaxed security teams, a fragmented perimeter, and highly motivated cybercriminals leveraging new cybercrime-as-a-service offering—we have seen a rise in cybercrime, including a staggering seven-fold increase in ransomware targeting organizations.

The ongoing expansion and erosion of the perimeter underscores the need for a new approach. This approach needs to include extending deep security monitoring and enforcement to every device—trusted or otherwise. Interpersonal relationships may be built on trust, but it’s increasingly apparent that zero trust builds healthier IT relationships. An unexpected silver lining to the current mass experiment in remote work is that this transition could spell the end of trust-based security.

Introducing zero trust

If trust-based access won’t work, what will? Zero Trust Access (ZTA) is a network security concepts that believes that no one and no device, whether inside or outside the network, should be trusted unless their identification has been thoroughly checked.

Zero-trust operates on the assumption that threats both outside and inside the network are an ever-present reality and that potentially every user and device has already been compromised. It also treats every attempt to access the network or an application as a threat. And as a result of these assumptions, network’s administrators need to redesign their security strategies and solutions to support rigorous, trustless security measures.

 

Reaping the benefits of zero trust

A zero trust philosophy can help organizations with security in terms of:

  • Protection of customer data – Zero-trust eliminates the wasted time and frustration that comes from the loss of customer data, along with the cost of losing customers who no longer trust the business.
  • Consistent security across all threat vectors – a zero-trust approach to security provides a consistent approach to protecting access to assets on the core network, branch locations and the cloud, protection for and from remote workers, and extends security to the digital supply chain.
  • Reduced redundancy and complexity of the security stack – When a zero trust system handles all security functions, you can eliminate stacks of redundant firewalls, web gateways, and other virtual and hardware security devices.
  • Reduced need to hire and train security professionals – A central zero-trust system means you don’t have to hire as many people to manage, monitor, secure, optimize, and update security controls. And given the ongoing cybersecurity skills gap, this is a huge benefit because, according to the latest (ISC)² Cybersecurity Workforce Study, the number of additional trained staff needed to close the current skills gap is 3.12 million professionals.

 

Creating a zero trust environment

Setting up ZTA includes establishing pervasive application access controls, strong authentication capabilities, and powerful network access control technologies. 

By using the zero trust model for application access, organizations are able to shift from only relying on traditional virtual private network (VPN) tunnels to secure assets being accessed remotely. Part of the challenge is that VPN often provides unrestricted access to the network, allowing compromised users or malware to move laterally across the network looking for resources to exploit.

ZTA network connections address this issue by only granting access to network resources on a policy-based, per-session basis to individual applications only after devices and users have been authenticated and verified. The system applies this policy equally whether users are on- or off-network, providing the same zero trust protections no matter from where a user is connecting. 

Secure authentication plays a pivotal in the implementation of an effective security policy. Many of today’s most damaging security breaches have been due to compromised user accounts and passwords, and these breaches have been exacerbated by users with inappropriate or excessive levels of access. Instead, organizations must adopt the practice of applying “least access” privileges as part of their access management so should a user account be compromised, cyber adversaries only have access to a restricted subset of corporate assets. 

And to extend that level of protection further, a zero trust approach also empowers organizations to identify and secure unknown IoT endpoint and devices entering the network. Integrated endpoint visibility, granular control, advanced protection, and policy- and context-based endpoint assessment work together to ensure organizations are protected against compromised devices. Organizations need to establish a level of visibility that sees every device on the network through the lenses of device identification, profiling, and vulnerability scanning. Tying this analysis with dynamic micro-segmentation enables further control over devices on the network.

 

Zero trust, maximum security

In today’s work-from-home world, organizations need to find ways to trust no one while still allowing legitimate users and devices to access the network and needed applications so they can do their jobs. And in a world where performance and user experience are critical, strengthening security cannot result in slowing down users and processes to a crawl—which require planning your zero trust strategy well. That includes implementing access controls for the network and applications and deploying robust authentication capabilities that don’t hamper productivity. By establishing a zero-trust access strategy, you’ll protect customer data, defend and control access to crtical assets, bypass the need to hire more scarce security professionals, and at the same time, actually reduce security complexity.

KEYWORDS: cyber security information security risk management zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aamir Lakhani is a cybersecurity researcher and practitioner at FortiGuard Labs.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Padlock on keyboard

    Zero trust: A business imperative for the digital age

    See More
  • cyber network

    The three main ingredients for the successful implementation of Zero Trust in the time of COVID-19: Machine learning, carta and software defined perimeter

    See More
  • eye-scan1-900px.jpg

    TRUST - the Five Essential Rules of Consumer Privacy in the Age of Face Recognition

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing