acm-header
Sign In

Communications of the ACM

ACM TechNews

SolarWinds, Microsoft Hacks Prompt Focus on Zero-Trust Security


View as: Print Mobile App Share:
A SolarWinds facility.

Some cybersecurity experts say constant verification, rather than focusing on blocking intruders, should be adopted as the strategy to prevent cyberattacks.

Credit: Sergio Flores/Reuters

At an April 22 virtual event, the U.S. Department of Defense's John Sherman said the public and private sectors should adopt zero-trust models that constantly verify whether a device, user, or program should be able to do what it is asking to do.

Ericom Software Ltd.'s Chase Cunningham said, "No one who actually understands zero trust says abandon the perimeter. But the reality of it is that you need to understand your perimeter's probably already compromised, especially when you're in a remote space."

Carnegie Mellon University's Gregory Touhill stressed that zero trust is not a technology but a strategy, adding "We've got too many folks in industry that are trying to peddle themselves as zero-trust vendors selling the same stuff that wasn't good enough the first time."

From The Wall Street Journal
View Full Article - May Require Paid Subscription

 

Abstracts Copyright © 2021 SmithBucklin, Washington, DC, USA


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account