1、Produced in partnership withZero trust closes the end-user gap in cybersecurity Organizations go beyond passwords to embrace a new approach to defending against cyberattacks.Key takeaways123ou may have noticed its a little harder to get around in cyberspace.More six-digit authorization codes texted
2、to your phone.More requests to confirm the name of your first pet or fourth-grade teacher.More boxes to check to“trust this device.”Overall,having to prove more often that you are you.Its not your imagination.Its a comparatively new cybersecurity philosophy called“zero trust,”and its transforming ne
3、tworks globally.Its just what it sounds like:the network,site,or application wont allow you in without proof you belong there.Mayank Agarwal,head of cybersecurity for North America at Infosys,thinks of zero trust as a mindset change.“Zero trust is front and center of all cybersecurity discussions.It
4、s about principles of least privilege.This means giving access only for a time,with the least amount of access.Once done with whatever job you are supposed to do,access is taken away.”An MIT Technology Review Insights poll of global business leaders reveals three out of four organizations have becom
5、e more aggressive in their approach to cybersecurity over the past two years,and end-user security tops the list of cybersecurity concerns.2 MIT Technology Review Insights in partnership with Infosys CobaltAbout 40%of poll respondents said their organizations have already adopted a zero-trust model,
6、while another 18%are in the process of implementing the model,and 17%are in the planning stages.And this is important says Vishal Salvi,chief information security officer for Infosys,because companies need to think about“adopting a new security architecture to support new connectivity models.”Securi