It isn’t that we struggle to define the zero trust security model. It’s that we ignore the real challenge, says Jack Miller of Menlo Security. We need to shift our view of authentication and access from “innocent until proven guilty” to “guilty until proven innocent.”
In this video interview with Information Security Media Group, Miller discusses:
The application of this new view to access.
The role of Internet isolation in this model.
The need for new education to ensure maximum adoption.