The following is an excerpt from The New Stack’s latest ebook, “Trust No One and Automate (Almost) Everything: Building a Modern Zero Trust Strategy.”https://thenewstack.io/ebooks/security/trust-no-one-and-automate-almost-everything-building-a-modern-zero-trust-strategy/ to get your free copy of our ebook, sponsored by Torq. At the core of a https://thenewstack.io/qa-what-is-zero-trust/ strategy is re-thinking how companies approachhttps://thenewstack.io/category/security/, from who is involved to what the goal is.

Security experts talk about “trust” — trusted users, trusted devices — and design security programs that assume that some humans and computers are by default “trusted.”

Start implementing a zero trust security strategy slowly, advised John Kindervag, of ON2IT, who is often called the creator of zero trust.

There are tools that will help you implement zero trust, but effectively implementing zero trust requires much more than purchasing software.

Related Articles