Mit Magzter GOLD unbegrenztes Potenzial nutzen

Mit Magzter GOLD unbegrenztes Potenzial nutzen

Erhalten Sie unbegrenzten Zugriff auf über 9.000 Zeitschriften, Zeitungen und Premium-Artikel für nur

$149.99
 
$74.99/Jahr

Versuchen GOLD - Frei

Demystifying the concept of zero trust security

Voice and Data

|

May,2023

Cyber security is a risk management function and organisations need to make decisions on trade-offs or risk acceptance when they implement controls 

- VISHAL SALVI

Demystifying the concept of zero trust security

The Cybersecurity hazard is at an all-time high due to several changes in the business environment. The proliferation of personal devices and the adoption of the hybrid work model and digital technologies are creating multiple vulnerable nodes that are exposed to security breaches.

Organisations and their CISOs are challenged by the evolving threat landscape. The need for strategic thinking and rehashing the fundamental security architecture construct is much higher than ever. In this context, the Zero Trust Security Architecture is one approach that’s increasingly getting a lot of traction. At a higher level, Zero Trust assumes that your business is continuously compromised, and the architecture aims to mitigate that.

SECURITY FROM A DIFFERENT PERSPECTIVE

Fundamentally, cyber security is a risk management function where we need to make decisions on tradeoffs or risk acceptance when we implement controls. It is difficult to imagine a world where we would only have absolute control. Another important factor to note is that trust is contextual. The security world has built various models and solutions for adaptive controls or transparent controls. These models are based on answering questions about who, where, why, when and what of a transaction before any verification, approval or denial is made.

Security architecture has always relied on trust models. There are many technical controls that we trust before we grant or deny access to resources. For all this to work properly, security teams must ensure the highest degree of integrity to handshakes or trust.

WEITERE GESCHICHTEN VON Voice and Data

Voice and Data

Voice and Data

Digital infrastructure shifts from scale to trust

AI-scale compute, multi-agent automation, domain LLMs, and sovereign cloud shifts are redefining digital infrastructure—with trust and risk at the core.

time to read

4 mins

January 2026

Voice and Data

Voice and Data

5G FWA growth drives a modest wireless subscriber uptick

TRAI's November 2025 data shows wireless growth led by Jio and Airtel, as 5G FWA expands and Vi and MTNL continue to lose users.

time to read

3 mins

January 2026

Voice and Data

Voice and Data

Security goes autonomous: Al agents, twins, AR wearables

Agentic Al, digital twins, and AR wearables are moving from pilots to operations, reshaping how Indian security teams detect, decide, and act.

time to read

6 mins

January 2026

Voice and Data

Voice and Data

The thinking network: Making every node count

AI agents and cloud-led orchestration will transform enterprise networks into intelligent systems that act, predict, and optimise before issues arise.

time to read

3 mins

January 2026

Voice and Data

Voice and Data

From dumb pipes to intelligent telecom platforms

As consumer monetisation plateaus, telcos are shifting from pipes to programmable networks–selling APIs, trust, and outcomes as software platforms.

time to read

9 mins

January 2026

Voice and Data

Voice and Data

Can the techco pivot drive Reliance Jio's USD 170 B bid?

Reliance Jio IPO will test whether telecom can be valued as a platform, with Al and scale of media reshaping industry multiples and investor appetite.

time to read

6 mins

January 2026

Voice and Data

Voice and Data

Semicon PLI could de-risk India's digital infrastructure build

As India scales 5G, fibre, edge, and data centres, Semicon India aims to improve component supply, lead times, and cost stability for equipment.

time to read

4 mins

January 2026

Voice and Data

Voice and Data

Cloud-native workflows are shrinking enterprise latency

Event-driven cloud, microservices, and iPaaS orchestration are moving context with the asset-enabling real-time approvals, compliance, and execution.

time to read

4 mins

January 2026

Voice and Data

Voice and Data

From threats to trust: How Al secures digital growth

As cyber threats evolve, Al is helping Indian D2C and B2C businesses turn digital vulnerabilities into resilience, trust, and sustained growth.

time to read

2 mins

January 2026

Voice and Data

Voice and Data

Laser nanowire films promise EMI shielding for 6G devices

Glasgow researchers create transparent, flexible silver nanowire films that cut EMI across 2.2-6 GHz, enabling denser radios in future devices.

time to read

3 mins

January 2026

Translate

Share

-
+

Change font size