End-user Trust: The Bullseye of Modern IT Security
The Zero Trust IT security approach is gaining popularity, globally. The reason behind this IT security philosophy becoming mainstream is that it demands continuous assessment of the ‘trust’. Yes, it is the ‘trust’ that is conferred upon end-users, privileged users, administrators to access systems, is the weakest link in the attack kill-chain. Steered away by […]