Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Zero Trust Modernizes Cybersecurity in Public and Private Sectors
Cybersecurity

How Zero Trust Modernizes Cybersecurity in Public and Private Sectors

Chris HughesBy Chris HughesMarch 23, 2023Updated:April 19, 20235 Mins Read
Facebook Twitter LinkedIn Email
zero trust
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

If you’ve been paying any attention to the technology or cybersecurity industries over the past two to three years, you have no doubt been exposed to the term “zero trust.” It is, in some ways, an overused term that means something different to nearly anyone you ask. Some think of it as a set of tools while others think of it as the lack of a security perimeter. Still others think it implies no trust, ever.

Despite the differences of opinion and understanding, many are rallying around zero trust as a more modern approach to securing applications and data than previous security models. They are eager to shift from the legacy of perimeter-based cybersecurity to a model that is data and identity-centric.

So, what exactly is zero trust, where did it come from, and why do you need to know about it? In this analysis, we’ll explore the concept of zero trust, its varying definitions, and its growing popularity as a more effective cybersecurity model than its predecessors.

What Is Zero Trust?

While there are many potential zero trust definitions to choose from, a good starting point is the National Institute of Standards and Technology (NIST), an authoritative source of cybersecurity publications that deliver standards, guidelines, and best practices.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

In NIST 800-207, the organization states:

“Zero trust (ZT) provides a collection of concepts and ideas designed to minimize
uncertainty in enforcing accurate, least privilege per-request access decisions in
information systems and services in the face of a network viewed as compromised. Zero
trust architecture (ZTA) is an enterprise’s cybersecurity plan that utilizes zero trust
concepts and encompasses component relationships, workflow planning, and access
policies. Therefore, a zero trust enterprise is the network infrastructure (physical and
virtual) and operational policies that are in place for an enterprise as a product of a zero
trust architecture plan.”

History of Zero Trust

Early dialogue on zero trust, or at least concepts related to de-emphasizing perimeter-based cybersecurity approaches, can be traced back to 2004 and a group known as the “Jericho Forum.” That dialogue continued and, in 2010, cybersecurity expert John Kindervag coined the term “zero trust.” The concept gained further momentum through organizations such as Google and its BeyondCorp initiatives, which focus on bolstering its own internal security practices and architecture.

Zero trust picked up significant steam with the publication of the Cybersecurity Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity.” Zero trust was mentioned over 10 times in this order, and it was positioned as a key component of modernizing the U.S. federal government’s cybersecurity. This was followed by publications including the Federal Zero Trust Strategy and the CISA Zero Trust Maturity Model. The recently published 2023 National Cybersecurity Strategy also emphasizes zero trust, further cementing its role in cybersecurity.

While these publications and initiatives are government-centric, they inevitably have led to a tremendous increase in industry dialogue around the concept of zero trust and subsequent efforts by the commercial sector to increase its own adoption of zero trust.

Adding to the momentum for zero trust, there has been significant investment and effort by cybersecurity tech providers to help organizations utilize more modern technologies to enable zero trust outcomes.

I personally work with federal agencies and program offices and have seen firsthand their tremendous interest in zero trust. In response to the Cybersecurity Executive Order, Federal Zero Trust Strategy, and CISA Zero Trust Maturity Model, agencies are starting to assess their current level of zero trust maturity and develop implementation plans to address gaps and deficiencies.

This is leading to increased investments, technology modernization, and improvements to policies and processes related to architecture, data, and identity management, all of which are difficult in large, complex environments like federal agencies.

Insights into the Why & How to Secure SaaS Applications_featured
Guidebook: Secure SaaS Applications

Why You Need to Know About Zero Trust

One of the biggest differences between zero trust and legacy approaches to cybersecurity is the removal of implicit trust. This isn’t to say that there is no trust or zero trust, but that trust isn’t implicit: Access and authorization decisions aren’t made once and then never revisited. Practices including context-based access control are requirements.

These changes mean that understanding users’ device posture, geographic locations, unique roles and responsibilities, and more drive access-control decisions. They also imply more robust encryption throughout the organization’s systems and applications. This includes segmentation to ensure one incident doesn’t compromise the entire tech infrastructure or organization.

Final Thoughts

If one thing is clear, it’s that both public and private sector organizations view zero trust as a key component of modernizing cybersecurity and mitigating threats in the modern threat landscape. Many organizations are now well on their way to adopting and implementing a zero-trust architecture, but a significant portion of organizations still have yet to begin.

If you’re an information technology (IT) or security leader, you need to have a fundamental understanding of what zero trust is, and what it isn’t, to secure your organization, data, and brand reputation as the threat landscape continues to evolve.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity data technology zero trust
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Workday Dismisses Agentic AI Arms Race, Focuses on Business Impact

May 16, 2025

C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future

May 15, 2025

AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills

May 15, 2025

Parisa Tabriz on Google Chrome Enterprise Security and AI Innovation | Cloud Wars Live

May 14, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Workday Dismisses Agentic AI Arms Race, Focuses on Business Impact
  • Workday Lone Wolf: Focuses on 8 AI Agents vs. Competitors’ Hundreds
  • C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future
  • AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills
  • Microsoft’s Mission to Make Your Company AI First

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.