Technology Magazine November 2025 | Page 223

CYBERSECURITY
WHAT IS ZERO TRUST?
Zero Trust is a security model based on the principle of‘ never trust, always verify.’ It eliminates the old idea of a trusted internal network and an untrusted external network. In a Zero Trust architecture, no user or device is trusted by default, whether inside or outside the network. Every access request is treated as a potential threat and must be strictly authenticated and authorised before access is granted. This approach relies on multiple data points – like user identity, device health, location and the specific service being requested – to make intelligent, real-time access decisions, significantly reducing the risk of a breach.

“ORGANISATIONS MUST‘ NEVER TRUST AND ALWAYS VERIFY,’ TAKING A ZERO TRUST APPROACH TO SECURITY”

Jeetu Patel, President and CPO, Cisco
Similarly, while 87 % of leaders consider Identity Threat Detection and Response( ITDR) to be crucial, its effectiveness is often undermined by poor data integration. The report found that only 52 % of organisations have fully integrated their identity and device data streams, hindering the real-time visibility needed for an effective response. The root of these issues is often a reactive culture; a significant 74 % of IT leaders acknowledged that identity security is typically implemented following a security breach or to meet compliance mandates, rather than as a proactive strategy.
As Matt Caulfield concludes, this mindset is no longer viable:“ At Duo, we know that managing who accesses what, from where and on which device is not just a daily challenge – it’ s a strategic imperative.”
technologymagazine. com 223