Cyber Magazine June 2024 | Page 161

“ In a zero trust model , no actor or system can be trusted in any form ,” he explains . “ They require continuous monitoring , third-party risk management and cloud security . And with so many touchpoints where actors can access data , multi factor authentication becomes critical .”
50 % of zero trust programmes risk failure Despite the growing embrace of zero trust , challenges persist . A survey conducted by PlainID reveals a stark reality : while CISOs are integrating zero trust frameworks , authorisation remains a critical gap . Only half of respondents cite authorisation as a core component of their zero trust programmes , signalling a disconnect between intent and execution .
This gap is exacerbated by resource constraints and technical complexities . Many organisations resort to homegrown solutions , potentially compromising security posture and increasing operational costs over time . With cyber adversaries evolving continuously , maintaining a robust cybersecurity strategy is imperative . Without adequate technical expertise and comprehensive authorisation frameworks , organisations risk betraying the trust of partners and customers in the event of a breach .
cybermagazine . com 161