Hajj minister: 1.2 million pilgrims arrive as preparations are underway for a successful Hajj    Saudi Arabia sets up National Semiconductor Hub to attract SR1 billion investment    US tells Israel to be transparent over Gaza school strike    Russia detains French man accused of gathering military intelligence    Eleven tons of rubbish taken off Himalayan peaks    Embracing change: A journey towards inner peace    NMC: Pilgrims set to enjoy 16 years of spring and winter Hajj seasons starting from 2026 NMC opens Media and Awareness Production Center in Mina    US-made munitions used in deadly Israeli strike on UN school in central Gaza    Looked down and out, India's opposition is now back    Saudi Arabia plans to boost oil production capacity to 12.3 million bpd by 2028    Saudi ministry launches comprehensive dictionary of energy terminology    Al-Qasabi at Shoura Council: Commercial registrations surge 43% in 6 years    Riyadh Air signs MoU with China Eastern Airlines to strengthen Saudi-China air travel    Mohammed Al-Turki steps down as CEO of Red Sea Film Foundation    Saudi delegation participates in ITU Council meeting in Geneva    Cristiano Ronaldo hails 2023-24 RSL season as 'one of the best' of his career    TeamLab Borderless Museum opens at Historic Jeddah The first of its kind in the Middle East    Germany's head coach blasts public broadcaster for 'racist' survey    Climate protester sticks poster over Monet painting at Paris museum    Cristiano Ronaldo vows Al Nassr will come back stronger after King's Cup heartbreak    Al Hilal clinches King Cup in intense penalty shootout and dramatic final    JK Rowling in 'arrest me' challenge over hate crime law    Trump's Bible endorsement raises concern in Christian religious circles    Hollywood icon Will Smith shares his profound admiration for Holy Qur'an    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Zero Trust: A practical approach to cybersecurity
Published in The Saudi Gazette on 29 - 07 - 2020

Trust is a dangerous word in the information technology field, especially when that trust is implicit — when it's unqualified or unquestioned.
Creating a large, sealed-off corporate network security perimeter and trusting everything inside of it has proven time and again to be a flawed design. The old "corporate network" model with static defenses is incompatible with the cloud, transient users, remote working or unknown devices. A paradigm shift is required.
Zero trust is a holistic approach to security that addresses threats and changes in how businesses work. It's a model and a philosophy for organizations on how to think about and how to do security.
The model guides you to treat all devices as if they were Internet-facing and, instead of having one single perimeter, you must create many micro perimeters (or microsegments), applying checks and controls around everything and between everything. Some of the benefits of adopting a zero trust model are:
Control of the entire IT estate
From inside the office all the way to the cloud platforms you use. No more lack of control outside the corporate perimeter or struggles with remote users.
Manage and secure all users in the same way
By no longer seeing things as inside or outside the corporate perimeter, you can treat all users in the same way. This both simplifies IT security while also ensuring all devices and users are treated equally.
Maintain security even when you don't own/have full control over the infrastructure in use By using identity, location, device health, MFA, and overlaying monitoring and analysis, you're still able to have strong security across any kind of environment, platform, or service.
Drastically reduce the movement of malware or attackers
Rather than having free rein of the entire network once they're inside, attackers only have access to the bare minimum of systems the compromised user had access to. By continuing to distrust the authenticated user, checks will be in place between those systems, further limiting the ability to spread.
From a disease control perspective, social distancing and a complete lockdown is a concept that is extremely useful, when it's well-implemented. It's the same with zero trust in the cyber security world. Currently cybersecurity experts suggest trust nothing. Ever.
For when you trust nothing, you are forced to seek relevant security measures wherever there is a risk. Verify everything. Do not assume that passing a check naturally affords trust. Having credentials doesn't mean you are trustable. It just means you have credentials. And credentials can be stolen. Zero trust is the ultimate security model that will protect organizations from all kinds of cyber threats and assist in business continuity during the pandemic.
It takes a lot of technologies to secure all the resources and assets you'll have on a network. A zero trust technology stack needs to address two major areas — the management of zero trust, and the security and control of your various resources and assets.
Management is broken into three sub-areas:
Automation and orchestration – for defining dynamic policies, coordinating all the different technologies, and putting everything into place
Visibility and analytics – for maintaining oversight of the network and ensuring everything is working as well as identify threats and breaches if or when they occur
APIs – for integrating your various technologies together, getting data out of one system and into another
Resources and assets are broken down into five sub-areas:
People – the users, admins, etc. who work for or with your business
Data – the lifeblood of all organizations and perhaps the most important asset to secure
Devices – the servers, laptops, virtual machines, etc. you use to conduct your business
Workloads – the services and apps you use to process data, perform calculations, generate reports, etc
Networks – the communication channels over which data flows, web, email, Wi-Fi, the internet, and so on
As it stands, Zero trust — is the future of the cybersecurity space. Currently very few organizations are able to readily embrace it. However, as security perimeters continually erode, the need for adoption will become increasingly prevalent.
Cybercriminals are only getting more innovative and defences are struggling to keep up with this. The zero trust model represents a way to truly minimize threats all the while setting new standards in cybersecurity protocol.
— The writer is director sales engineering, MEA, Sophos


Clic here to read the story from its source.