By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software\n\nLast December, Broadcom Software published our blog: Predictions for 2022. We will now explore each of these in more depth in our next blog series. First up, Zero Trust.\n\n\n\nPrediction: Zero Trust becomes table stakes\n\nBad actors are stepping up their attacks, and companies have new problems to solve for.\n\nFor example, with nearly half (47%) of business leaders planning to allow employees to work remotely full time in the post-Covid era, more company personnel are using their own or shared devices, sometimes over unsecured networks.\n\nMeanwhile, geopolitical conflicts are threatening to cause spillover effects on corporate networks. A specific example of this was a new form of disk-wiping malware (Trojan.Killdisk) being used to attack organizations in Ukraine shortly before the launch of a Russian invasion on February 24. Symantec, a division of Broadcom Software, also found evidence of wiper attacks against machines in Lithuania, which targeted areas in financial, defense, aviation, and IT services sectors.\n\nAnd the most recent Verizon security report found that over 80% of breaches involve brute force or the use of lost or stolen credentials.\n\nPerimeter defenses are a relic of the past, and it\u2019s time for CIOs to reexamine dated assumptions -- not the least of them being an over-reliance upon VPNs to protect company security. Even before the pandemic forced companies, seemingly overnight, to shift to remote work, the migration of business to the cloud raised new questions about the ability of conventional perimeter-based defenses to protect critical systems and data. Those questions can\u2019t be put off any longer.\n\nNew Threats Call for New Thinking\n\nWhen Forrester coined the Zero Trust security model in 2010, they were looking to represent a methodology for how to transact business securely based on the principle of "never trust, always verify.\u201d It was a data-centric model where you don\u2019t trust anything going on inside or outside of the perimeter. It meant continuously verifying every user and device and always assuming your organization will be breached.\n\nI can understand why some might be wary of Zero Trust, as it constitutes a very different philosophy of how we should secure our infrastructure, networks, and data. But there\u2019s a reason why this is the right idea.\n\nThe Zero Trust model rests upon one fundamental tenet: don\u2019t trust any actor, system, network, or service operating outside or within the security perimeter. Period. That means verify everybody and everything trying to establish access. And it doesn\u2019t stop with just verifying once at the perimeter; it also involves continual verification of each user, device, application, and transaction.\n\nContext becomes critical to establishing trust. In some contexts, you\u2019ll have very little trust, and in other contexts, more trust \u2013 all based on risk-based policies. That means coming up with answers to different questions, such as ones that address the health of the device and its security. For example: Is it on a known network or an unknown one? Is it located in a specific geo-location? What are the governance conditions?\u00a0\n\nUltimately, everything boils down to context and determining the level of risk an organization is willing to take. Then it becomes a matter of putting the right controls in place and determining the level of risk as the company decides what to allow, what to block and what\u2019s required to enable identities to access resources.\n\nThe World is `Getting It\u2019\n\nPerhaps then it\u2019s unsurprising that in January of this year, \u00a0\n\nThe Office of Management and Budget published a Federal Zero Trust architecture strategy, outlining specific cybersecurity standards and objectives that federal agencies must meet by the end of Fiscal Year (FY) 2024. It also reflects the government\u2019s increased sense of urgency about cybersecurity. Last spring the White House announced an executive order to modernize the government\u2019s IT infrastructure and bolster its ability to withstand cyberattacks. (You can read more about what it means here.)\n\nMeanwhile, Forrester notes that t\u200b\u200bwo-thirds of those agencies plan to increase their investment in Zero Trust technology deployments this year.\u00a0\n\nBut this transition remains uneven. Only a little more than one-third of the organizations surveyed by Forrester have begun the work to deploy a Zero Trust strategy. Just 6% reported having fully deployed their rollout. The encouraging news is that it\u2019s only a matter of time before things change markedly for the better. That same Forrester report found that 68% of organizations intend to increase their Zero Trust investment this year.\n\nSo, it\u2019s now a race against time. We know what\u2019s out there \u2013 the so-called \u201cknown unknowns\u201d \u2013 and it\u2019s not good. The question is: How soon we can put a Zero Trust strategy in practice to make sure we can mitigate those threats? The clock is ticking.\u00a0\n\nContact Broadcom Software now to see how we can help you achieve Zero Trust at scale.\n\nAbout Andy Nallappan:\n\nAndy is the Chief Technology Officer and Head of Software Business Operations for Broadcom Software. He oversees the DevOps, SaaS Platform & Operations, and Marketing for the software business divisions within Broadcom.