文本描述
Organizations go beyond passwords to embrace a new approach to defending against cyberattacks. Zero trust closes the end-user gap in cybersecurity Produced in partnership with 2 MIT Technology Review Insights in partnership with Infosys Cobalt Key takeaways 1 Y The zero-trust cybersecurity philosophy ou may have noticed it’s a little harder to is transforming global networks. These networks, sites, or applications won’t allow you in (or let you stay) without proof you belong there, and they monitor for unexpected behavior. get around in cyberspace. More six-digit authorization codes texted to your phone. More requests to con?rm the name of your ?rst pet or fourth-grade teacher. More boxes to check to “trust this device.” Overall, having to prove more often that you are you. 2 3 The shift to cloud computing and decentralized work immediately led to an uptick in cybercrime. Security methods have had to move quickly to modernize. It’s not your imagination. It’s a comparatively new cybersecurity philosophy called “zero trust,” and it’s transforming networks globally. It’s just what it sounds like: the network, site, or application won’t allow you in without proof you belong there. Mayank Agarwal, head of cybersecurity for North America at Infosys, thinks of zero trust as a m 。。。以下略