Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Education

White Paper: Traditional vs. zero-trust architecture, which is right for your organization and why?

  • CFE Media and Technology
  • January 21, 2022
Photographer: Patrick T. Fallon/Bloomberg via Getty Images
Total
0
Shares
0
0
0
0

The year 2021 was the year cybersecurity went mainstream. High-profile strikes such as the Colonial Pipeline ransomware attack in May 2021 and the SolarWinds supply chain hack resulted in a new U.S. Executive Order and associated Department of Homeland Security (DHS) regulations. Threat actors are evolving their tactics faster than ever, while cybersecurity teams attempt to stay one step ahead of those trying to compromise operational technology (OT) and information technology (IT) networks.

Traditional perimeter network security focuses on keeping attackers out of the network, but these measures are vulnerable to users and devices inside the network. According to an IBM X-Force report, 13% of all OT-related cybersecurity issues in 2020 were initiated by insiders.

The other option is the “never trust, always verify” approach, which is the basis for the zero-trust framework recommended by the federal government. Zero-trust architecture repeatedly questions the premise that users, devices and network components should be implicitly trusted based on their location within the network.

This white paper compares the two approaches, traditional and zero-trust architecture, and examines the advantages and drawbacks of each. It also gives examples of situations where one architecture is preferred over the other. It will give readers an understanding of each approach and help them select the best solution for protecting their OT networks.

REGISTER NOW!

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

CFE Media and Technology

Since its founding in 2010, CFE Media and Technology has provided engineers in manufacturing, commercial and industrial buildings, and manufacturing control systems with the knowledge they need to improve their operational efficiency. CFE delivers the right information at the right time around the world through a variety of platforms.

Related Topics
  • CFE Content
  • Featured
  • white paper
Previous Article
  • IT/OT

Five steps for OT endpoint security success

  • John Livingston
  • January 20, 2022
Read More
Next Article
A lightbulb
  • Regulations

What you need to know about the NERC CIP standards

  • Verve Industrial
  • January 25, 2022
Read More
You May Also Like
Graphic of M1 Chip
Read More

Researchers discover a new hardware vulnerability in the Apple M1 chip

Read More

Webcast: Using MITRE ATT&CK for ICS to Protect Your Business

Read More

Protecting Critical Infrastructure eBook

Courtesy: Bundy Group
Read More

Cybersecurity mergers and acquisitions and capital markets update

Read More

Webcast: How to Protect Against Supply Chain Attacks

Courtesy of: Louisiana State University
Read More

Taking a ‘hands-on’ approach to smartphone identity verification

Courtesy: Applied Control Engineering Inc.
Read More

New funding will help University of Arizona grow the cybersecurity workforce

Hero and Rajapaske stand next to the microscope display showing an image of the multiplying B-cells. (Courtesy of: Silvia Cardarelli, Electrical and Computer Engineering, University of Michigan)
Read More

Immune to hacks: Inoculating deep neural networks to thwart attacks

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT