Sign In

The road to zero trust

Digital transformation and distributed workforces are two of the defining features of modern work. Both have benefited employers and employees alike, but they present a significant security risk. In response, many organisations are adopting a zero-trust strategy. This is a security model, based on least-privilege access and repeated ID verification, that assumes by default that anyone seeking to access a network is hostile until they can prove otherwise. How do IT professionals envision the development of this model and what challenges do they face in implementing it?
B Corp Logo

Raconteur is now a B Corp!

Find out how we did it, and what it means for our readers.
Learn more