Thanks to IBM Power10 Security, “Zero Trust” is Building Confidence

Antonio Grasso
3 min readDec 6, 2021

Article in partnership with IBM.

Almost daily, our global news cycle runs stories about cyber-attacks on our systems. Whether it’s stealing data or seeking ransom, these reprehensible acts make us feel, at best, insecure, and perhaps even hostage to hackers. Of course, they also carry a significant cost to the companies that must reclaim their data, restore public trust, and pay the penalty for violating privacy and protection laws. This is compounded when the data is considered ‘sensitive’ and isn’t de-identified, as in the case of financial or health data.

No question, there is a highly sophisticated and lucrative market for hackers — one that’s propped up on well-established business models, strategic operations, and extensive technological and human resources.

We, executives and entrepreneurs, to mitigate consequences, train employees to recognize the scale of the problem so that they can identify early warning signs, just as we invest heavily in technological resources to monitor, prevent, and block nefarious users. Globally, large techno players are innovating systems to make them less vulnerable to attack. For instance, the Zero Trust Security Model requires all users — whether they fall within or outside an organization’s network — to be authenticated, authorized, and continuously validated before they can access applications and data. Essentially, Zero Trust assumes that there is no network edge: networks can be local, in the Cloud, or a…

--

--

Antonio Grasso

Author, technologist, sustainability advocate | FRSA | B2B digital creator & influencer | Founder & CEO @dbi.srl