{"id":3324,"date":"2023-06-29T12:41:08","date_gmt":"2023-06-29T19:41:08","guid":{"rendered":"https:\/\/dev.trustwrx.com\/?p=3324"},"modified":"2023-06-29T15:30:22","modified_gmt":"2023-06-29T22:30:22","slug":"zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet","status":"publish","type":"post","link":"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/","title":{"rendered":"\u2018Zero trust\u2019 was supposed to revolutionize cybersecurity. Here\u2019s why that hasn\u2019t happened yet."},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-despite-more-than-a-decade-of-talk-the-seminal-concept-in-cybersecurity-of-zero-trust-the-assumption-that-no-user-or-device-on-a-computer-network-can-be-trusted-hasn-t-been-implemented-nearly-as-widely-as-one-might-expect-from-all-of-the-attention\">Despite more than a decade of talk, the seminal concept in cybersecurity of&nbsp;<a href=\"https:\/\/siliconangle.com\/2020\/02\/23\/trust-nothing-breaches-mount-radical-approach-cybersecurity-gains-favor\/\">zero trust<\/a>&nbsp;\u2014 the assumption that no user or device on a computer network can be trusted \u2014 hasn\u2019t been implemented nearly as widely as one might expect from all of the attention.<\/h2>\n\n\n\n<p>Despite more than a decade of talk, the seminal concept in cybersecurity of&nbsp;<a href=\"https:\/\/siliconangle.com\/2020\/02\/23\/trust-nothing-breaches-mount-radical-approach-cybersecurity-gains-favor\/\">zero trust<\/a>&nbsp;\u2014 the assumption that no user or device on a computer network can be trusted \u2014 hasn\u2019t been implemented nearly as widely as one might expect from all of the attention.<\/p>\n\n\n\n<p>The problems include numerous practical and perceptual obstacles, coupled with a complex collection of products that need careful coordination to deliver on its promises. The upshot: Zero trust won\u2019t be a silver bullet for ever-growing cybersecurity woes anytime soon.<\/p>\n\n\n\n<p>The zero-trust label was first developed by John Kindervag when he was an analyst at Forrester Research back in 2010. The way it\u2019s supposed to work is that companies must ensure that every file request, database query or other action on a network&nbsp;comes from a user with the correct privileges. New devices must be registered and validated before they can access each network application, and each user who tries to log in is presumed to be hostile until proven otherwise. Done correctly, it promises to free users from many of the restrictions of more mainstream approaches to cybersecurity, improving defenses.<\/p>\n\n\n\n<p>Since he came up with the idea, Kindervag has gone on to establish a management services provider that offers one of many dozens of solutions that lay claim to his creation. Almost all of the major security providers have a service or product with the term as part of the product name these days, and some, such as Cisco Systems Inc., have made recent&nbsp;<a href=\"https:\/\/siliconangle.com\/2023\/06\/07\/security-meets-networking-cisco-tackles-zero-trust-vs-vpn-headache-ciscolive\/\">product announcements<\/a>&nbsp;staking the zero-trust territory.<\/p>\n\n\n\n<p>But in practice, despite all these products, a complete zero-trust solution remains largely incomplete \u2014 and in some cases unused. John Watts, a Gartner analyst, wrote in the firm\u2019s annual predictions memo from last December that \u201cmoving from theory to practice with zero trust is challenging,\u201d and that fewer than 1% of large enterprises are actually using it today.<\/p>\n\n\n\n<p>Moreover, Watts predicted that \u201cover 60% of organizations will embrace zero trust as a starting place for security by 2025 but more than half will fail to realize the benefits.\u201d A<a href=\"https:\/\/news.mit.edu\/2022\/zero-trust-architecture-may-hold-answer-cybersecurity-insider-threats-0517\">&nbsp;report from Nathan Parde of MIT\u2019s Lincoln Lab<\/a>&nbsp;last May, meantime, estimated the typical zero-trust deployment will take anywhere from three to five years. That is a depressing thought, to be sure.<\/p>\n\n\n\n<p>These results are at odds with other providers\u2019 surveys showing a more rosy picture.&nbsp;<a href=\"https:\/\/www.okta.com\/\">Okta Inc.\u2019s&nbsp;State of Zero Trust Security August 2022<\/a>&nbsp;report found that nearly all of the 700 organizations surveyed have either already started a zero-trust initiative or have definitive plans to start one in the coming months.<\/p>\n\n\n\n<p>But these results are somewhat misleading. First, years could pass between starting and completing a zero-trust rollout. And second, what someone says and what the organization does are usually two different things, and the survey could have cherry-picked zero-trust fans.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A brief history of cybersecurity<\/h3>\n\n\n\n<p>The idea of segregating network infrastructure to provide better protection of various resources arguably began with the first network firewalls and virtual private networks or VPNs that came of age in the mid-1990s.&nbsp;<a href=\"https:\/\/www.darkreading.com\/analytics\/who-invented-the-firewall-\">DarkReading has this interesting look<\/a>&nbsp;way back in 2008 at the many authors who could be called the inventor of the firewall, which most analysts would say was first commercialized by Check Point Software Technologies Ltd., which is still selling it. As to the&nbsp;first VPN protocols, most agree they were created by Microsoft Corp. in 1996, and then became popular at the turn of the century, and are still being sold, by Cisco, Juniper Networks Inc. and others.<\/p>\n\n\n\n<p>What firewalls and VPNs accomplished was to separate networks by enacting various policies: Network traffic coming from internal marketing databases would be allowed in this part of the network, while traffic coming from internal personnel databases would not. Or queries from external networks were allowed to access a corporate web server, but not anything else. How these policies were constructed was the secret sauce of both of these products, and cybersecurity specialists went through lots of training to figure this all out.<\/p>\n\n\n\n<p>That was fine in the era when network perimeters were hard and well-defined. But as web applications were scattered across the online diaspora, the perimeter was no longer a viable conceit, and impossible to enforce. As business used more complex software supply chains, they became dependent on those application programming interfaces and had less insight into how the various software pieces fit together.<\/p>\n\n\n\n<p>This is how many exploits happen, because the bad guys know they can eventually find a way into a network. VPNs and firewalls became new security sinkholes, especially as more untrusted remote devices joined corporate networks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enter zero trust<\/h3>\n\n\n\n<p>That\u2019s where Kindervag\u2019s zero-trust philosophy came into being. He said that you can\u2019t trust anyone or any app and have to vet every interaction, what some security professionals called \u201cleast privilege.\u201d It began an era of adaptive authentication, where people and apps weren\u2019t granted 100% access initially but organizations doled out incremental approvals based on circumstances.<\/p>\n\n\n\n<p>For example, if you query your bank for a current balance, you have to prove you own your account. But if you want to transfer funds, you have to do more, and if you want to transfer funds to a new overseas account, you have to do more still.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright\"><img decoding=\"async\" data-src=\"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2023\/06\/Screenshot-2023-06-08-at-7.53.10-AM-300x203.png\" alt=\"\" class=\"wp-image-619734 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 300px; --smush-placeholder-aspect-ratio: 300\/203;\" \/><\/figure><\/div>\n\n\n<p>Today\u2019s zero trust has created the concept of a \u201ctrust broker,\u201d or a mediator or some neutral third-party that will be trusted by both sides of a transaction. Setting these up, especially among both sides that don\u2019t necessarily know or trust each other directly, isn\u2019t easy, especially if different brokers are required for different situations, apps, and types of users.<\/p>\n\n\n\n<p>That complexity is where we stand with today\u2019s zero-trust implementations. NetIQ, now part of OpenText Corp., said in its \u201c<a href=\"https:\/\/www.microfocus.com\/en-us\/assets\/cyberres\/state-of-zero-trust\">State of Zero Trust in the Enterprise<\/a>\u201d report, \u201cHaving enterprise systems, applications and data in one location and relying on layers of security tools and controls to keep attackers out is no longer sufficient when the bulk of data and workloads now live outside the traditional network. Zero trust is not a single piece of software but a strategic framework.\u201d One way to visualize this is how Gartner shows its architectural diagram (adjacent) as a series of interconnected parts, such as handling user identity, threat intelligence and applications.<\/p>\n\n\n\n<p>Let\u2019s take a closer look at both \u201cstrategic\u201d and \u201cframework\u201d and what they mean for zero-trust implementations. Strategic means that at the heart of any solid cybersecurity plan, as much as possible needs to be zero trust. This is what President Biden\u2019s&nbsp;<a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\">Executive Order on Improving the Nation\u2019s Cybersecurity<\/a>&nbsp;was attempting to motivate two years ago, with&nbsp;a goal for federal agencies to implement zero trust security.<\/p>\n\n\n\n<p>Although it was&nbsp;laudable, it is still far from being realized. Even an executive order can\u2019t make zero trust happen by fiat, although recently, federal agencies were&nbsp;<a href=\"https:\/\/www.cisa.gov\/news-events\/directives\/binding-operational-directive-23-02\">told to remove internet access<\/a>to a variety of networked devices such as VPNs and routers, something that should have been obvious by now to any information technology manager.<\/p>\n\n\n\n<p>One author said in a&nbsp;<a href=\"https:\/\/www.securityweek.com\/history-and-evolution-zero-trust\/\">post for Security Week<\/a>&nbsp;last year, \u201cThe only way to guarantee zero trust is the proverbial method of unplugging the computer, encasing it in six feet of lead lined concrete, and dropping it into a deep ocean. But this hinders usability.\u201d The trick is therefore to move from this extreme and unworkable position to something that can deliver security and business benefits and actually be useful too. And that is where the framework part comes into consideration.<\/p>\n\n\n\n<p>\u201cThere is no right or wrong way to implement a zero trust framework, but it is basically a good construct,\u201d Phil Dunkelberger, chief executive of authentication provider Nok Nok Labs, told SiliconANGLE. \u201cThe devil is in the details, and there is no one-size-fits-all users and use cases, making it difficult to deploy.\u201d<\/p>\n\n\n\n<p>His perspective is that IT and security managers are asking the wrong questions when the time comes to formulate a zero-trust implementation plan. \u201cWhat about zero trust will drive better business outcomes?\u201d he said. \u201cWill we have more secure apps, or prevent data loss, or increase the return on these infrastructure investments?\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Rethinking trust<\/h3>\n\n\n\n<p>Perhaps many people have been thinking about zero trust in the wrong light. Trusting a user or an app occupies a continuum, like adaptive authentication: You start out with taking small steps towards total trust, offering a little bit at a time. Moving from an all-or-nothing approach, this \u201ctiny trust\u201d model is better-suited to today\u2019s world.<\/p>\n\n\n\n<p>One way to conceptualize this is to consider adopting microsegmentation to isolate apps, essentially abstracting firewalls to specific workloads and users. Gartner\u2019s Watts says this means \u201cimplementing zero trust to improve risk mitigation for the most critical assets first, as this is where the greatest return on risk mitigation will occur.\u201d<\/p>\n\n\n\n<p>Gartner uses five considerations to define zero trust: what the delivery platform is, how to enable remote work securely, how to manage the various trust policies, how to protect data anywhere and what integrations with third-party products are there. That is a lot of touchpoints, for either a framework or a series of any products, to deliver on.<\/p>\n\n\n\n<p>\u201cZero trust can be applied as a mindset or paradigm, strategy or implementation of specific architectures and technologies,\u201d Watts said in his predictions report. He has several suggestions to help organizations be more successful at its implementation, including defining the proper scope and level of sophistication of zero-trust controls at the beginning of a project, limiting access to devices and applications, and applying continuous risk-based access policies.<\/p>\n\n\n\n<p>\u201cFundamentally, zero trust means removing the implicit trust (and the proxies for trust) that have formed the foundation of many security programs, with explicit trusts based on identity and context,\u201d he said, \u201cThis will require changing the way security programs and control objectives are set, and especially changing the expectations about level of access.\u201d<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright\"><img decoding=\"async\" data-src=\"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2023\/06\/Screenshot-2023-06-14-at-2.49.56-PM-300x172.png\" alt=\"\" class=\"wp-image-620360 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 300px; --smush-placeholder-aspect-ratio: 300\/172;\" \/><\/figure><\/div>\n\n\n<p>Amazon Web Services Inc. at its recent re:Inforce conference in Anaheim, California, showed examples of how this will work. Jess Szmajda, general manager for AWS\u2019 Network Firewall, showed how existing zero-trust services such as Verified Access and VPC Lattice will work together with a series of new zero-trust services to make AWS more secure. They include&nbsp;<a href=\"https:\/\/aws.amazon.com\/verified-permissions\/\">Verified Permissions<\/a>&nbsp;and expanded features to its GuardDuty threat monitoring tool to add better granularity of security policies and more preventative controls. Amazon calls this \u201cubiquitous authentication.\u201d<\/p>\n\n\n\n<p>The upshot is that organizations should prepare a long and winding road ahead for zero trust. But especially if they can demonstrate the immediate business benefits, it\u2019s worth taking those first steps.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Image:&nbsp;<a href=\"https:\/\/pixabay.com\/illustrations\/cybersecurity-data-privacy-security-7225623\/\">Luigeop\/Pixabay<\/a><\/h5>\n\n\n\n<p><a href=\"https:\/\/siliconangle.com\/2023\/06\/28\/zero-trust-supposed-revolutionize-cybersecurity-heres-hasnt-happened-yet\/\">https:\/\/siliconangle.com\/2023\/06\/28\/zero-trust-supposed-revolutionize-cybersecurity-heres-hasnt-happened-yet\/<\/a><\/p>\n\n\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile has-white-background-color has-background\"><figure class=\"wp-block-media-text__media\"><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Despite more than a decade of talk, the seminal concept in cybersecurity of zero trust \u2014 the assumption that no user or device on a computer network can be trusted \u2014 hasn\u2019t been implemented nearly as widely as one might expect from all of the attention.<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[134,127,111,133,132],"tags":[140,142,141,143,139,138],"class_list":["post-3324","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-remote-work","category-security","category-small-and-medium-sized-businesses","category-zero-trust-network-access-ztna","tag-cybersecurity","tag-remote-work","tag-security","tag-smb","tag-zero-trust","tag-ztna"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u2018Zero trust\u2019 was supposed to revolutionize cybersecurity. Here\u2019s why that hasn\u2019t happened yet. - TrustWrx<\/title>\n<meta name=\"description\" content=\"ZTNA, Zero Trust\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018Zero trust\u2019 was supposed to revolutionize cybersecurity. Here\u2019s why that hasn\u2019t happened yet. - TrustWrx\" \/>\n<meta property=\"og:description\" content=\"ZTNA, Zero Trust\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/\" \/>\n<meta property=\"og:site_name\" content=\"TrustWrx\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-29T19:41:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-29T22:30:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2023\/06\/Screenshot-2023-06-08-at-7.53.10-AM-300x203.png\" \/>\n<meta name=\"author\" content=\"Dan Corcoran\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Corcoran\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/\",\"url\":\"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/\",\"name\":\"\u2018Zero trust\u2019 was supposed to revolutionize cybersecurity. Here\u2019s why that hasn\u2019t happened yet. - TrustWrx\",\"isPartOf\":{\"@id\":\"https:\/\/dev.trustwrx.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2023\/06\/Screenshot-2023-06-08-at-7.53.10-AM-300x203.png\",\"datePublished\":\"2023-06-29T19:41:08+00:00\",\"dateModified\":\"2023-06-29T22:30:22+00:00\",\"author\":{\"@id\":\"https:\/\/dev.trustwrx.com\/#\/schema\/person\/e0dadff2c186f4e330509b0443cf0ecd\"},\"description\":\"ZTNA, Zero Trust\",\"breadcrumb\":{\"@id\":\"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/#primaryimage\",\"url\":\"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2023\/06\/Screenshot-2023-06-08-at-7.53.10-AM-300x203.png\",\"contentUrl\":\"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2023\/06\/Screenshot-2023-06-08-at-7.53.10-AM-300x203.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dev.trustwrx.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u2018Zero trust\u2019 was supposed to revolutionize cybersecurity. Here\u2019s why that hasn\u2019t happened yet.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dev.trustwrx.com\/#website\",\"url\":\"https:\/\/dev.trustwrx.com\/\",\"name\":\"TrustWrx\",\"description\":\"The SMB Security Solution for Managed Services Providers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dev.trustwrx.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/dev.trustwrx.com\/#\/schema\/person\/e0dadff2c186f4e330509b0443cf0ecd\",\"name\":\"Dan Corcoran\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dev.trustwrx.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6c3c05781c9eb5d8ed4b001b68cdd573e9b38605e912012de6ce402e815f4ac1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6c3c05781c9eb5d8ed4b001b68cdd573e9b38605e912012de6ce402e815f4ac1?s=96&d=mm&r=g\",\"caption\":\"Dan Corcoran\"},\"sameAs\":[\"https:\/\/trustWrx.com\",\"http:\/\/www.linkedin.com\/pub\/dan-corcoran\/0\/1b3\/275\/\"],\"url\":\"https:\/\/dev.trustwrx.com\/index.php\/author\/corcoran\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u2018Zero trust\u2019 was supposed to revolutionize cybersecurity. Here\u2019s why that hasn\u2019t happened yet. - TrustWrx","description":"ZTNA, Zero Trust","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/","og_locale":"en_US","og_type":"article","og_title":"\u2018Zero trust\u2019 was supposed to revolutionize cybersecurity. Here\u2019s why that hasn\u2019t happened yet. - TrustWrx","og_description":"ZTNA, Zero Trust","og_url":"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/","og_site_name":"TrustWrx","article_published_time":"2023-06-29T19:41:08+00:00","article_modified_time":"2023-06-29T22:30:22+00:00","og_image":[{"url":"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2023\/06\/Screenshot-2023-06-08-at-7.53.10-AM-300x203.png","type":"","width":"","height":""}],"author":"Dan Corcoran","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dan Corcoran","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/","url":"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/","name":"\u2018Zero trust\u2019 was supposed to revolutionize cybersecurity. Here\u2019s why that hasn\u2019t happened yet. - TrustWrx","isPartOf":{"@id":"https:\/\/dev.trustwrx.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/#primaryimage"},"image":{"@id":"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/#primaryimage"},"thumbnailUrl":"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2023\/06\/Screenshot-2023-06-08-at-7.53.10-AM-300x203.png","datePublished":"2023-06-29T19:41:08+00:00","dateModified":"2023-06-29T22:30:22+00:00","author":{"@id":"https:\/\/dev.trustwrx.com\/#\/schema\/person\/e0dadff2c186f4e330509b0443cf0ecd"},"description":"ZTNA, Zero Trust","breadcrumb":{"@id":"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/#primaryimage","url":"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2023\/06\/Screenshot-2023-06-08-at-7.53.10-AM-300x203.png","contentUrl":"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2023\/06\/Screenshot-2023-06-08-at-7.53.10-AM-300x203.png"},{"@type":"BreadcrumbList","@id":"https:\/\/dev.trustwrx.com\/index.php\/zero-trust-was-supposed-to-revolutionize-cybersecurity-heres-why-that-hasnt-happened-yet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.trustwrx.com\/"},{"@type":"ListItem","position":2,"name":"\u2018Zero trust\u2019 was supposed to revolutionize cybersecurity. Here\u2019s why that hasn\u2019t happened yet."}]},{"@type":"WebSite","@id":"https:\/\/dev.trustwrx.com\/#website","url":"https:\/\/dev.trustwrx.com\/","name":"TrustWrx","description":"The SMB Security Solution for Managed Services Providers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.trustwrx.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/dev.trustwrx.com\/#\/schema\/person\/e0dadff2c186f4e330509b0443cf0ecd","name":"Dan Corcoran","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dev.trustwrx.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6c3c05781c9eb5d8ed4b001b68cdd573e9b38605e912012de6ce402e815f4ac1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6c3c05781c9eb5d8ed4b001b68cdd573e9b38605e912012de6ce402e815f4ac1?s=96&d=mm&r=g","caption":"Dan Corcoran"},"sameAs":["https:\/\/trustWrx.com","http:\/\/www.linkedin.com\/pub\/dan-corcoran\/0\/1b3\/275\/"],"url":"https:\/\/dev.trustwrx.com\/index.php\/author\/corcoran\/"}]}},"_links":{"self":[{"href":"https:\/\/dev.trustwrx.com\/index.php\/wp-json\/wp\/v2\/posts\/3324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.trustwrx.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev.trustwrx.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev.trustwrx.com\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.trustwrx.com\/index.php\/wp-json\/wp\/v2\/comments?post=3324"}],"version-history":[{"count":8,"href":"https:\/\/dev.trustwrx.com\/index.php\/wp-json\/wp\/v2\/posts\/3324\/revisions"}],"predecessor-version":[{"id":3333,"href":"https:\/\/dev.trustwrx.com\/index.php\/wp-json\/wp\/v2\/posts\/3324\/revisions\/3333"}],"wp:attachment":[{"href":"https:\/\/dev.trustwrx.com\/index.php\/wp-json\/wp\/v2\/media?parent=3324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev.trustwrx.com\/index.php\/wp-json\/wp\/v2\/categories?post=3324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev.trustwrx.com\/index.php\/wp-json\/wp\/v2\/tags?post=3324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}