Thursday, 16 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Security > Zero Trust: Countering Cyber Threats Stemming from Human Error | DCN
Security

Zero Trust: Countering Cyber Threats Stemming from Human Error | DCN

Last updated: February 5, 2024 3:31 am
Published February 5, 2024
Share
Zero Trust: Countering Cyber Threats Stemming from Human Error
SHARE

The mainstay of cybersecurity practices has been that bad actors are ‘out there’ and defense mechanisms secure workloads and data ‘in here.’ This drives the perimeter-centric idea of enterprise security, focusing primarily on inbound attacks with firewalls and passwords to protect workloads and data.

However, after the pandemic and the consequent acceleration in digital transformation, the challenges for protecting users and workloads have increased significantly. Boardroom meetings went virtual, sensitive company data was shared among geographically distributed teams, and employees now access enterprise servers via multiple devices to stay connected.

Related: Rethinking Physical Data Center Security in the Digital Age

As the corporate IT infrastructure changed, the bad actors also evolved by changing methods and volume of attacks. The perimeter-centric view of security no longer holds in a digital, distributed IT environment with multiple failure points, which makes it easier for bad actors to scout and exploit vulnerabilities.

Often, these vulnerabilities are people. Per Verizon’s 2023 Data Breach Investigations Report, 74% of security breaches can be traced back to human error, which refers to an employee either purposefully doing something they should not or falling prey to bad actors attaining access or information from them. Over the years, the cost of a single breach has only escalated, standing at $4.3 million in 2023, according to IBM’s latest Cost of Data Breach Report.

Paranoia is good: Why Zero Trust is the Need of the Hour

Related: Preventing Sabotage and Improving Physical Data Center Security

The threat exposure landscape has evolved into a complex mesh, creating a need for something more than a perimeter-centric security approach.

See also  Oracle Posts Biggest Gain Since 2021 on Cloud Revenue Growth | DCN

Zero trust is an approach that leads to a simpler network infrastructure, a better user experience, and an improved cybersecurity posture. It enforces access policies based on context, including a user’s role and location, their device, and the data they are requesting. It blocks inappropriate access and lateral movement throughout an environment. 

And just as with any other foundational shift, the zero-trust security approach comes with its challenges.

Laying the Groundwork for Zero Trust

Enterprises find it difficult to pivot to a zero-trust security model because, at its very core, it calls for a mental shift away from the three crucial pillars of traditional security approaches:

  1. Trust perimeter: Traditional security practices assume personas that can be trusted with access. It works with the perimeter-centric view that establishes a network-based connection and grants access to systems on that network. Zero trust turns this on its head and assumes a trust perimeter is insufficient, and instead requires every stakeholder to establish identity and the need for access on a workload-by-workload basis.
  2. Networks provide security: Traditional enterprise security revolves around firewalls, virtual private networks (VPNs), or dedicated physical network connections. These have proved to be inadequate, expensive, and difficult to manage. The zero-trust security model eliminates the need for many of these network technologies, freeing up costs and providing greater flexibility.
  3. IAM-first focus on people: A zero-trust architecture offers a secure connection to workloads with accurate user privileges, while ensuring applications have up-to-date Identity and Access Management (IAM) policies.
     

Five-Point Enterprise Strategy for Zero Trust      

Zero Trust starts with “Never trust, always verify,” but goes beyond identity and secure access. Threats can emerge externally and internally, necessitating a comprehensive risk assessment that pinpoints vital data, IT assets, potential threats, and potential attack vectors, including those originating from insiders.

See also  Here’s the letter from 14 senators slamming TSA facial recognition in airports

Here are five critical points enterprises need to consider when implementing a zero-trust security approach:

  1. Map the data flow: It’s essential to understand which users or applications require specific access. Deploying IAM with multi-factor authentication and the principle of least-privilege access, backed by regular audits and adjustments is key.
  2. Context-based policies: The zero-trust approach assumes policies verify access requests based on context. This includes the user identity, the device the request is coming from, the location of the request, the type of data to be accessed, and the application being accessed. This ensures that only those with established ‘reason’ can access specific assets and prevents an ‘untrusted’ network from gaining access to workloads and data it is not entitled to.
  3. Reduced attack surface: Because users are connecting directly to applications and other resources they need, they are not connecting to a network. This eliminates lateral movement and prevents compromised devices from infecting other resources. With this architecture, the applications are invisible to the internet, so they can’t be discovered and attacked individually.
  4. Make employees security aware: To achieve optimal results, it is essential that all employees fully understand and adhere to proper security practices. Rigorous training programs must be implemented to ensure everyone is equipped with the knowledge and skills to verify before trusting. Training needs to be an ongoing process, and tests should be run regularly to measure improvement and see who might need more focused training.
  5. Test via mock drills: In all environments, it’s imperative to have plans for implementing patches for discovered vulnerabilities updates across tools with a process to understand the impacts on other security tools and for incident response. However, simply having a plan is not always sufficient. Red team and purple team drills should be conducted regularly. Most importantly, tabletop drills for incident response need to be executed regularly so that all parties understand their roles in the event of an attack, and, in the worst case, how to execute a cyber recovery.
See also  Top 10 Data Center Sustainability Stories of 2023 | DCN

These actions will help organizations ensure consistent verification, preparedness, and preparation for attacks that will happen, regardless of the defenses in place.

By the time you finish reading this article, a hacker could have attempted to access privileged or critical information through a phishing attack, malware, or social engineering maneuvers.

The need of the hour is a security strategy where policies are applied based on the context of least-privileged access and strict user authentication – not assumed trust. In other words: never trust, always verify.


George Symons is Vice President of Strategy for Cloud, Infrastructure, and Security at Persistent Systems.

Source link

Contents
Paranoia is good: Why Zero Trust is the Need of the HourLaying the Groundwork for Zero TrustFive-Point Enterprise Strategy for Zero Trust      
TAGGED: Countering, Cyber, DCN, error, Human, Stemming, threats, Trust
Share This Article
Twitter Email Copy Link Print
Previous Article Atom Computing Says Its New Quantum Computer Has Over 1,000 Qubits Atom Computing Says Its New Quantum Computer Has Over 1,000 Qubits
Next Article Protesters block traffic as they participate in a "car caravan" protest at the Amazon Spheres to demand the Seattle City Council tax the city Cloud, Data, and Political Protests Mark the 2022 AWS Summit | DCN
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Volcano Watch: HVO’s mission depends on reliable and secure IT solutions

The USGS Hawaiian Volcano Observatory (HVO) is accountable for monitoring and learning some of the…

May 26, 2024

Lata Varghese – Rackspace Technology –

Lata Varghese has been named Senior Vice President of Enterprise Transformation by Rackspace Know-how. Lata…

November 25, 2025

Astera Labs Debuts PCIe Cables for Scaled Cloud and AI Deployments

Astera Labs, a renowned player in the semiconductor connectivity sphere has unveiled its Aries PCIe…

January 31, 2024

Stonepeak’s Digital Edge Gets $1B Loans for Data Centers

(Bloomberg) -- Digital Edge DC, an organization backed by non-public fairness fund Stonepeak Infrastructure Companions,…

January 6, 2025

Humach Acquires Markets EQ – FinSMEs

Humach, a Frisco, TX-based AI buyer expertise firm, acquired Markets EQ, a supplier of AI-powered…

April 8, 2025

You Might Also Like

As cyber-attacks become more and more sophisticated, cybersecurity must adopt a zero trust policy- verify, validify and authenticate at every step. Biometrics can help reduce friction in this process.
Innovations

Biometrics in zero trust architecture: Rebuilding security around identity

By saad
SAP brings agentic AI to human capital management
AI

SAP brings agentic AI to human capital management

By saad
Female Engineer Working on Quantum Computer Hardware, Using Tablet Computer to Access Technical Specifications and Control Processor Parameters. Group of Developers Work on AI Behind a Desk
Global Market

New tool on AWS makes it easier to develop quantum error correction

By saad
New TPM 2.0 specification aims to enhance security against quantum threats
Power & Cooling

New TPM 2.0 specification aims to enhance security against quantum threats

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.