The Zero Trust approach calls for devices to be verified even if they have previously been permissioned on a network. We now connect more devices via the Internet of Things (IoT) than ever before in both the personal and professional settings. Generally, IoT equipment are designed to provide a single service – which unfortunately means security is not their main priority. This lack of in-built security makes these devices vulnerable to attacks, creating a potential route into the entire organisation’s network for attackers.
The Zero Trust concept in cybersecurity, where devices are never trusted by default but always verified, is not new.
However, Zero Trust may just be the turning point for organisations in Asia as they strengthen their defences in an increasingly digitalised environment, amidst an intensifying cyber threat landscape.

