Governance & Risk Management , IT Risk Management , Zero Trust

'Zero Trust': An Outdated Model?

Cyjax CISO Ian Thornton-Trump Offers a Critique
Ian Thornton-Trump, CISO at Cyjax

The zero trust model is outdated in today's cloud environment, says Ian Thornton-Trump, CISO at Cyjax, a threat intelligence company, who recommends the use of segmentation and monitoring for anomalous behavior instead.

See Also: How Enterprise Browsers Enhance Security and Efficiency

"Zero trust is not aligned to the agility and the ability to collaborate" that businesses want today, he says. "It's a dated artifact of the past."

In a video interview with Information Security Media Group, Thornton-Trump discusses:

  • Why he believes the zero trust model is now a “flawed” concept;
  • Alternatives to the model;
  • Why zero trust architecture is an out-of-date concept.

As CISO at Cyjax, Thornton-Trump performs real-time analysis of immediate threats and keeps abreast of developing security threats. Previously, he was CTO at Octopi Managed Services.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.