AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Zero Trust security: the importance of assigning the level of trust to corporate users

The challenge of cybersecurity in the era of mobility and multi-device access

The article discusses the importance of correctly assigning trust levels in corporate devices to ensure greater cybersecurity. We also talk about the challenges in identifying the user and the device used, and recommend reliable authentication methods, such as the use of digital certificates and hardware tokens. It highlights the importance of a Zero Trust network and the need to use multiple communication channels to reach users.

This pill is also available in Italian language

As more devices are used by enterprise users, correctly assigning the level of trust becomes critical. Organizations with a greater focus on cybersecurity use X.509 digital certificates on user devices to create stronger credentials than traditional passwords.

The union between user identity and device identity: a challenge in the enterprise

Marrying user identity and device identity can lead to problems, especially when users use multiple devices. Copying credentials between different devices increases the risk of sensitive data being compromised, and devices may require different credentials depending on their capabilities. This problem is amplified even more in ICT networks with workstations shared by multiple users.

The user's identity: informal and authoritative

There are two types of identity: informal identity, the one with which groups self-define a person's identity based on their appearance and behavior, and authoritative identity, which is assigned by an entity responsible for issuing identity certificates . Government organizations issue identity documents that allow people to interact with private institutions and organizations, representing their identity.

Design a reliable authentication system in a Zero Trust network

When designing a reliable authentication system in a Zero Trust network, it is important to use multiple communication channels to reach users, such as sending one-time codes or push notifications. Additionally, the use of security hardware tokens, such as smart cards or Yubikey, can provide a unique assertion of a user's identity. It is also essential to consider the use of out-of-band authentication, which uses a separate communication channel than the primary channel used by the user to authenticate.

Follow us on Google News for more pills like this

09/21/2023 15:39

Editorial AI

Complementary pills

The revolution of the Zero-Touch model for corporate IT securityA new approach to enhance the protection of corporate IT systems

Last pills

Cyber attack in Indonesia: the new Brain Cipher ransomware brings services to their kneesNew ransomware hits Indonesia: learn how Brain Cipher crippled essential services and the techniques used by hackers

Patelco Credit Union: security incident halts customer services in CaliforniaService disruption and customer frustration: Patelco Credit Union works to resolve security incident

Cyber attack on TeamViewer: immediate response and investigations underwayStrengthened security measures and international collaborations to counter the cyber threat

Polyfill JS supply chain attack: what happenedA detailed analysis of the cyber attack that compromised a library essential for JavaScript compatibility in browsers