Go Unlimited with Magzter GOLD

Go Unlimited with Magzter GOLD

Get unlimited access to 10,000+ magazines, newspapers and Premium stories for just

$149.99
 
$74.99/Year

Try GOLD - Free

Demystifying the concept of zero trust security

Voice and Data

|

May,2023

Cyber security is a risk management function and organisations need to make decisions on trade-offs or risk acceptance when they implement controls 

- VISHAL SALVI

Demystifying the concept of zero trust security

The Cybersecurity hazard is at an all-time high due to several changes in the business environment. The proliferation of personal devices and the adoption of the hybrid work model and digital technologies are creating multiple vulnerable nodes that are exposed to security breaches.

Organisations and their CISOs are challenged by the evolving threat landscape. The need for strategic thinking and rehashing the fundamental security architecture construct is much higher than ever. In this context, the Zero Trust Security Architecture is one approach that’s increasingly getting a lot of traction. At a higher level, Zero Trust assumes that your business is continuously compromised, and the architecture aims to mitigate that.

SECURITY FROM A DIFFERENT PERSPECTIVE

Fundamentally, cyber security is a risk management function where we need to make decisions on tradeoffs or risk acceptance when we implement controls. It is difficult to imagine a world where we would only have absolute control. Another important factor to note is that trust is contextual. The security world has built various models and solutions for adaptive controls or transparent controls. These models are based on answering questions about who, where, why, when and what of a transaction before any verification, approval or denial is made.

Security architecture has always relied on trust models. There are many technical controls that we trust before we grant or deny access to resources. For all this to work properly, security teams must ensure the highest degree of integrity to handshakes or trust.

MORE STORIES FROM Voice and Data

Voice and Data

Voice and Data

Reimagining Earth through a living digital twin

A new geospatial alliance led by Aechelon seeks to build a real-time digital twin of Earth, merging satellite, radar, and Al for dynamic intelligence.

time to read

3 mins

October 2025

Voice and Data

Voice and Data

Telcos find new lifeline in spectrum slicing

As revenues shrink and competition intensifies, spectrum-as-a-service offers telcos a shared model to unlock growth while empowering enterprises.

time to read

7 mins

October 2025

Voice and Data

Voice and Data

Rethinking enterprise connectivity with managed Wi-Fi

As digital transformation accelerates, managed Wi-Fi is emerging as the backbone of agile, secure, and insight-driven enterprise connectivity in India.

time to read

4 mins

October 2025

Voice and Data

Voice and Data

Beyond VPN: Building trust into network access

As cyberthreats grow more complex, enterprises are shifting from VPNs to ZTNA to achieve secure, scalable, and context-aware access for remote users.

time to read

4 mins

October 2025

Voice and Data

Voice and Data

Banking on richer, safer digital conversations

RCS redefines banking communication with verified security, two-way interactivity, and measurable engagement that builds digital trust at lower cost.

time to read

3 mins

October 2025

Voice and Data

Voice and Data

Powering India's cloud with sustainable data hubs

India's data centre boom is reshaping digital infrastructure, demanding clean energy, local innovation, and policy alignment to sustain its growth.

time to read

5 mins

October 2025

Voice and Data

Voice and Data

Made in India: Building the backbone of loT hardware

From imported modules to home-grown chips, India's loT hardware story is evolving into one of design control, ecosystem depth, and strategic resilience.

time to read

4 mins

October 2025

Voice and Data

Voice and Data

Breaking data barriers with light

Li-Fi uses the power of light to deliver ultra-fast, secure, and interference-free connectivity-illuminating a new frontier in digital communication.

time to read

7 mins

October 2025

Voice and Data

Voice and Data

Cyber defence redefined as firewalls give way to foresight

Data security is evolving from reactive protection to predictive foresight— unifying platforms, intelligence, and AI to make organisations breach-ready.

time to read

3 mins

October 2025

Voice and Data

Voice and Data

Connecting the currents of digital finance

India's telcos are building the invisible pipes that keep digital payments, inclusion, and innovation flowing across the nation's financial ecosystem.

time to read

5 mins

October 2025

Translate

Share

-
+

Change font size