A panel at the Computing Cybersecurity Festival discussed some of the challenges created by a zero trust architecture, and why automation isn't always the answer.
The need to support WFH and flaws in the perimeter model has pushed ZTN to the fore
Access should depend on who they are, what they're doing and also what device they're using, says Proofpoint