View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
October 14, 2016

Cyber security enters the age of No Trust

Enterprises are starting to adopt a “No Trust” model that assumes no network, user, device or application can ever be fully trusted.

By CBR Staff Writer

Should enterprises move to a ‘No Trust’ model? Adam Boone, CMO of Certes Networks explains the approach.


The very successful digitisation trend over the past 20 years has produced huge efficiencies in every type of corporation and government. But the dark side is that the security industry has largely failed to evolve the standard security architecture to keep pace with these broader changes in IT.

malwareThe firewalled perimeter remains the primary defence in IT security. Yet every major data breach in the pandemic of breaches taking place around the world shows how simply firewalls can be bypassed. If a government worker clicks on the wrong email and falls prey to a phishing attack, a hacker can leapfrog the firewall and browse at will through the government agency’s digitised records and applications.

The explosion of IT systems, networks, users, Clouds and devices has caused the size of the typical enterprise’s attack surface to expand exponentially. Any user or device can be the weakest link and become the steppingstone to a major data breach.

Billions of dollars in venture capital over the past five years has been poured into start-ups trying to improve IT security. Yet industry statistics show that today the typical data breach still goes undetected for months. That’s an eternity for malware and Advanced Persistent Threats to be loose in your systems. And most of the largest vendors continue to make a lot of money selling the same old security architecture, doing nothing to truly fix the problem.

Adam Boone, CMO of Certes Networks.

Adam Boone, CMO of Certes Networks.

There are new security techniques that are proving to be effective and that do not require the enterprise or agency to cut off Internet connectivity.  One such strategy is called the “Zero Trust” or “No Trust” model.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

The old security architecture is built with the idea that you can use a firewall to keep unauthorised people out of the enterprise systems. This internal network is considered to be “trusted” and users who are authenticated and given access are likewise assumed to be “trusted.” This trust model is obsolete as every major data breach since the Target hack has shown.

Instead, enterprises are starting to adopt a “No Trust” model that assumes no network, user, device or application can ever be fully trusted. Instead, you assume that the network is already compromised, that a user actually is a hacker with stolen credentials, or that a device contains malware. With that assumption, how do you design the IT security architecture to minimise the damage?

IT security architects are deploying more sophisticated internal controls, segmenting and isolating applications by enforcing stronger rules on who should access them, even when the user is inside the network. Role-based access control is one such technique, inspecting the internal network traffic at various points and blocking attempts to access applications by users who don’t meet certain rules. Another technique is to use strong encryption to isolate internal applications so that if a hacker compromises a network device, the hacker cannot access the application traffic flowing through it.

But in addition to these better internal controls, the security industry as a whole must focus on making security easier to deploy and easier to manage. The typical security architecture is fragmented and splintered across IT silos, with different tools, different access policies, and different controls in the LAN, WAN, Internet, mobile network, Cloud, data centre and elsewhere. This means setting up and managing consistent, uniform security policies across all of these silos is extremely hard.

Until the security industry makes it easier for organisations to deploy a simpler, more consistent security architecture, the gaps left by fragmentation are going to remain the gateway for hackers to exploit. It is only by changing the way the security architecture is viewed that positive advances in the industry will really be seen.

Topics in this article : , , ,
Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.