The road to zero trust

Digital transformation and distributed workforces are two of the defining features of modern work. Both have benefited employers and employees alike, but they present a significant security risk. In response, many organisations are adopting a zero-trust strategy. This is a security model, based on least-privilege access and repeated ID verification, that assumes by default that anyone seeking to access a network is hostile until they can prove otherwise. How do IT professionals envision the development of this model and what challenges do they face in implementing it?