NEW Phishing Attack hits

Back to blog

Making sense of Zero Trust in today’s cyber climate

Marcos Colon | Dec 27, 2022

illustration of hand holding a phone with a video captioned making sense of Zero Trust

Share this article

Unless you don’t work in the security industry, the term Zero Trust is nearly as common as malware by now–and if you haven’t heard of it before, we certainly hope you’re not working in a cybersecurity department. While traditional approaches to security are built to authenticate users, devices and applications once at the edge of the network, that doesn’t work for today’s highly-distributed and mobile networks. That’s where Zero Trust comes in and turns these legacy approaches to cybersecurity on their head.

While you can get a true sense of our take on Zero Trust principles and policies here, chances are you’ll come across various takes on the topic when you scour the web–and therein lies where much of the industry’s confusion comes in. There isn’t much consistency in defining Zero Trust, but the benefits are seemingly all the same–a reduced attack surface that relies on continuous authentication.

In this brief discussion featuring Menlo Security Vice President of Product Management, Nick Edwards, he makes sense of Zero Trust in a day and age where attack surfaces are as endless as the alerts received by a security operations center.

Share this article

Make the secure way to work the only way to work.

To talk to a Menlo Security expert, please complete the form.