How do we trust the untrustable?
The latest statistics surrounding cyberattacks are staggering: Every 11 seconds, a cybersecurity incident occurs, each costing businesses an average of $2 million. By 2025, the cost of cyberattacks worldwide will reach $10 trillion.
Please listen to: Zero trust: Because no one is safe from attacks
"Cybersecurity attacks have reached epidemic proportions," says Dr. Eng Lim Goh, senior vice president and chief technology officer for artificial intelligence at Hewlett Packard Enterprise. From taking down financial networks and other critical infrastructure to forcing hospitals offline and endangering lives, cybercriminals are targeting organizations large and small across industries—and the risks are growing.
Zero trust: Trust no one by default
In an edge-centric, cloud-enabled, and data-driven world, network complexity is increasing and attack surfaces are expanding, says Goh. Today, enterprises must protect their proprietary assets and data in an environment that includes not only on-premises computers and servers but also cloud services, smartphones, and myriad other edge devices around the globe, he explains. At the same time, the pace of business is accelerating, meaning organizations must be able to securely share data and insights to keep up.
How can organizations operate at the speed of business while protecting their networks from attack? Increasingly the answer is found in the concept of zero trust, Goh says, a cybersecurity approach whereby no one and nothing is trusted by default.
Please read: Zero trust makes business secure by default
As he explains in this episode of On the Goh, zero trust solutions monitor all behavior on the network, from a remote worker accessing unusual files or apps to a printer acting like a server. The concept is gaining steam in the U.S., Goh notes, where the federal government recently issued an Executive Order mandating zero trust policies, and in Europe, where 93 percent of businesses say they are implementing zero trust strategies.
Protecting data—end to end
But zero trust isn't just about monitoring behavior. An effective zero trust framework requires new approaches to designing hardware, software, and firmware, ensuring security at every computing layer, Goh says. And key to that is AI-enabled automation. As businesses and their supply chains grow more and more sophisticated, organizations will need to leverage AI algorithms to "do the heavy lifting, balancing security and performance so business doesn't grind to a halt," he says.
HPE is leading such efforts by designing a security platform with zero trust architecture that protects data at every computing level, on every device, from edge to cloud. The objective is to "create a more secure environment that is flexible and scalable while reducing risk," Goh says.
With such zero trust solutions, he says, "we have an incredible opportunity to transform security so that it actually enables innovation."
Watch other On the Goh episodes.
This article/content was written by the individual writer identified and does not necessarily reflect the view of Hewlett Packard Enterprise Company.