Only 2% of assault paths lead to vital property. Securing the choke factors via which they go dramatically reduces danger. Security posture administration agency XM Cyber took tens of hundreds of assault path assessments involving greater than 60 million exposures affecting 20 million entities throughout 2022, anonymized the datasets and exported them to Cyentia Institute
Migrating legacy applications to the zero trust approach; Identifying assets on the network and figuring out how they communicate with each other;
Carefully defining appropriate use cases. Three CISOs offer insights on addressing each of these challenges and share their advice on making the most of a zero trust framework. (see: Migrating Legacy Applications
Dr. Durga Prasad Dube, senior vice president and global CISO at Reliance Industries, a multinational conglomerate based in Mumbai, says he began a zero trust project by defining its scope. One of the primary challenges is migrating legacy applications to a zero trust architecture, he says. While the zero trust model is well-suited for the latest technologies, such as the cloud, microservices or container systems, applying it to legacy apps is much more difficult, he says.