Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Ensure Zero Trust Keeps Pace With Attackers’ Fast-Evolving Techniques
Cybersecurity

How to Ensure Zero Trust Keeps Pace With Attackers’ Fast-Evolving Techniques

Frank DomizioBy Frank DomizioMarch 11, 20234 Mins Read
Facebook Twitter LinkedIn Email
zero trust frameworks
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

The zero trust security framework has been widely embraced in recent years as businesses look to secure their expanding range of digital assets. The framework is based on the principle that no user or device should be trusted by default. It requires that every access request to resources be authenticated, authorized, and continuously monitored. 

Widespread acceptance was bolstered in large part by President Biden’s Executive Order on Improving the Nation’s Cybersecurity requiring federal agencies to move to a zero trust architecture. 

While zero trust continues to gain acceptance, attackers are continuously evolving their tactics and techniques to exploit system vulnerabilities. They are also no longer just random individuals trying to hack into systems — they are now highly organized criminal groups, like FIN7 and Carbanak, using advanced technologies and sophisticated methods. These types of attackers use common techniques such as social engineering, phishing attacks, and malware, but they are also exploiting zero-day vulnerabilities and using deep supply chain attacks. 

Insights into the Why & How to Secure SaaS Applications_featured
Guidebook: Secure SaaS Applications

Strategies for Evolving Zero Trust Frameworks

While the zero trust framework is effective — it’s hard to find any examples of data breaches in cases where zero trust had been in place — it’s not an option to leave it unchanged. As attackers continuously evolve their tactics, the framework must evolve to keep pace. Just as we are moving from IPv4 (Internet Protocol version 4) to IPv6 (Internet Protocol version 6) or we are looking to quantum computing-resistant encryption, our defenses, along with the technology we use, must shift as threats shift. What worked yesterday may not work tomorrow.

While zero trust is still relatively new, it’s still useful to consider how the framework will need to morph as attackers inevitably seek ways around it. Here are a few ways to ensure zero trust stays one step ahead of those increasingly sophisticated threats.

Utilizing Advanced Technologies

Advanced technologies such as artificial intelligence (AI), machine learning (ML), and automation can help identify patterns and anomalies in network traffic, user behavior, and critical security events; they can be used to detect, and alert security teams to, suspicious activities in real-time. Automation can also play a critical role in evolving zero trust frameworks, streamlining security processes, and reducing the workload on security teams.

Additionally, cloud-based security services, such as cloud access security brokers (CASBs), can provide advanced security features, such as data loss prevention and identity and access management. These services can help organizations to monitor and control access to cloud resources, providing an added layer of security. By leveraging advanced technologies, organizations can stay ahead of attackers, protect their digital assets, and detect and prevent attacks before they cause significant damage.

The Need for Continuous Monitoring

Continuous monitoring is essential in identifying new attack techniques and vulnerabilities. Zero trust deployments should not trust a user that logs in from Philadelphia at 9 am and then logs in from Madrid at 9:30 am. Continuous monitoring entails monitoring an organization’s network and resources in real-time to identify potential threats and vulnerabilities.

Tools including Security Information and Event Management (SIEM), intrusion detection systems (IDS), network traffic analysis, vulnerability scanners, and endpoint detection and response (EDR) are all crucial parts of a continuous monitoring program and generally aren’t deployed all at once. In the case of zero trust, they must all work in concert.

Implementing a Culture of Security

Implementing a culture of security, which is a growing strategy for risk mitigation in general, is also essential for evolving zero trust frameworks.

A security-conscious culture means that everyone in the organization understands the importance of security, actively protects the organization’s digital assets, and reports any suspicious activities or incidents. We are not trying to create an organization of security professionals, but just as being a good CISO requires having some budgeting and HR knowledge, finance and HR professionals need to know a little bit about security in order to do their jobs and protect the interests of the organization.

This can be achieved through security awareness training, regular communication of security policies, and having a clear incident response plan. A culture of security can help prevent security incidents and reduce their impact, ensuring security is embedded in the organization’s culture and considered in all business decisions.

Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner analysts.

Conclusion

The zero trust framework is an effective model that can prevent unauthorized access to digital assets. However, the evolving nature of attackers means that security professionals must continuously consider how the framework might need to evolve. Organizations must understand that security is not a one-time occurrence; instead, it is a continuous process of monitoring and adaptation. An evolving zero trust framework can ensure that organizations are well-protected from the evolving tactics of attackers.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

ai Artificial Intelligence automation CISO featured framework Machine Learning security teams technology vulnerability zero trust
Share. Facebook Twitter LinkedIn Email
Frank Domizio
  • LinkedIn

Frank Domizio is an Acceleration Economy Analyst focusing on Cybersecurity. As a retired Philadelphia Police Officer, Frank got his start in cybersecurity while he was detailed to the FBI as a digital forensic examiner. Since then, Frank has held many positions in and around the federal government specializing in Cyber Threat Intelligence and Incident Response. Now, as a Federal Civilian for an Executive Branch Agency, Frank is a student of the strategy and leadership that goes into making a successful cybersecurity program. He is also an adjunct professor of cybersecurity at the University of Maryland Global Campus. Frank holds a Bachelor of Science in Computing Security Technology from Drexel University and a Master of Science in Cyber and Information Security from Capitol College as well as many industry certifications. As a Federal Government Employee Frank’s views are his own, not representing that of the U.S. Government or any agency.

Related Posts

AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers

July 3, 2025

AI Agent & Copilot Podcast: AIS’ Brent Wodicka on Operationalizing AI, the Metrics That Matter

July 3, 2025

Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live

July 2, 2025

Slack API Terms Update Restricts Data Exports and LLM Usage

July 2, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers
  • AI Agent & Copilot Podcast: AIS’ Brent Wodicka on Operationalizing AI, the Metrics That Matter
  • Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live
  • Slack API Terms Update Restricts Data Exports and LLM Usage
  • Google Cloud Still World’s Hottest Cloud and AI Vendor; Oracle #2, SAP #3

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.