{"id":9296,"date":"2019-03-14T13:19:12","date_gmt":"2019-03-14T17:19:12","guid":{"rendered":"https:\/\/armchairarcade.com\/perspectives\/?p=9296"},"modified":"2019-03-14T13:20:48","modified_gmt":"2019-03-14T17:20:48","slug":"zero-trust-security-taking-your-cyber-security-policy-to-the-next-level","status":"publish","type":"post","link":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/","title":{"rendered":"Zero Trust Security: Taking your cyber security policy to the next level"},"content":{"rendered":"<p>VPN services are becoming an almost omnipresent part of the modern Internet, as any assessment of contemporary VPN services &#8211; such as an <a href=\"https:\/\/vpnpro.com\/vpn-reviews\/avast-secureline-vpn-review\/\">Avast Secureline review<\/a> &#8211; will tell you. Keeping up with all of the latest network security information can be challenging, but one approach that you should definitely ensure that you\u2019re familiar with is the so-called Zero Trust Approach.<\/p>\n<p><strong>Zero Trust<\/strong><\/p>\n<p>The Zero Trust Approach is also sometimes referred to as the Zero Trust Network, or Zero Trust Architecture, but all of these names amount to the same thing. This security model was created in 2010 by John Kindervag, who was employed as a principal analyst at Forrester Research when hit upon this unique approach to network security.<\/p>\n<p>Zero Trust differs from conventional methods of network security, which are based on the notion that everything within an internal network can be trusted. I\u2019m sure you can guess where Zero Trust gets its name from &#8211; it doesn\u2019t make this assumption! The reality is that attacks on enterprise networks are becoming ever more sophisticated; thus, it is no longer possible for such assumptions to be made. Hackers and attackers are capable of hiding their tracks, and security measures need to reflect this new normal.<\/p>\n<p><strong>Always Verify<\/strong><\/p>\n<p>The foundation of Zero Trust is a very simple principle. Never trust, always verify. This approach to network security is designed to address lateral threat movement by using a sophisticated micro-segmentation granular perimeter enforcement approach. Zero Trust makes it far harder for nefarious traffic to move through a system undetected, and can even be partnered with other security approaches in order to really escalate security.<\/p>\n<p>At its core, Zero Trust ensures that all data and resources within an enterprise network are accounted for, based on user and location. Nothing is left to chance, and nothing errant is allowed to happen. All traffic and data flow is identified at all times, and anything that has not confirmed its identity will be required to do so. You could view Zero Trust as a sort of stop-and-search policy for IT networks!<\/p>\n<p><strong>Benefits of Zero Trust<\/strong><\/p>\n<p>There are many benefits of Zero Trust, but in this particular article we\u2019re going to look at four of them. The first obvious advantage of Zero Trust over other security methods is its ability to reduce the amount of time taken to breach detection, while also enabling you to gain visibility into your enterprise traffic. Zero Trust provides key insight into who precisely is accessing your network, and from where, ensuring that you\u2019re always on top of any traffic issues. This can be critical considering the escalation in malware attacks.<\/p>\n<p>Another advantage of Zero Trust security is that it helps deal with the skills gap that can be all evident in the rapidly evolving computing landscape. Cybercrime is stretching even the most skilled IT professionals to the limit, and keeping up with the black hat hacker community can be an insoluble problem. Zero Trust helps organizations get around this problem by negating the need to install a complex array of equipment, and continually update it. A single service in the cloud will monitor all activity with zero trust, also potentially saving companies money in hardware costs.<\/p>\n<p>Zero Trust is also helping to enhance the end-user experience within what are often clunky enterprise networks. And the system is also helping facilitate the corporate shift to the cloud, by ensuring that IT managers no longer need to feel as concerned about multiple users accessing cloud-based applications across a variety of devices. And because Zero Trust follows least access principles, it enables companies to offer each with a tailored palette of app and data options.<\/p>\n<p><strong>Integrating with Zero Trust<\/strong><\/p>\n<p>Another valuable aspect of Zero Trust is that it can be integrated with other facets of network security to create an even more robust package. The most obvious candidate for this is a Virtual Private Network (VPN), with many providers offering VPN solutions that can be tailored for a partnership with Zero Trust architecture.<\/p>\n<p>VPNs provide an extra level of encryption and privacy, and enable in conjunction with Zero Trust for endpoints to be completely secured. The endpoint and network security integration achieved by this partnership also enhances granular visibility, and this can then allow much speedier decision-making to take place within companies. It is important to take appropriate security measures with such a setup, though, and multi-factor authentication should be considered a must.<\/p>\n<p>Zero Trust systems can also be integrated with identity providers, such as Azure AD, Okta, Ping and Centrify, in order to beef up security even further. The password authentication systems offered by these providers just give your enterprise network that extra layer of security.<\/p>\n<p>Mobile Device Management (MDM) is another obvious technology to integrate with Zero Trust, and this can be really valuable for companies hoping to operate a Bring Your Own Device (BYOD) approach. MDM and MYOD are perfectly possible with Zero Trust architecture, with solution from companies such as Intune, AirWatch and MobileIron able to ensure that widespread connectivity is possible across iOS, Android, Windows, and Mac devices, while retaining your Zero Trust principles.<\/p>\n<p>And there are also a variety of Internet as a System providers that are fully compatible with a Zero Trust approach. Major platforms such as Azure, AWS, and Google Cloud Platform are known for possessing their own excellent security features, but these are ramped up further still when they are integrated with Zero Trust architecture. By using Software Defined Perimeters (SDP), Zero Trust operators can provide fully secure access to cloud apps, and gain all of the benefits of the cloud, with all of the security of Zero Trust.<\/p>\n<p><strong>Massive Contribution<\/strong><\/p>\n<p>In summary, Zero Trust is making a massive contribution to network security, and ensuring that IT personnel can stay one step ahead of the hackers. It is a technology that is likely to figure increasingly prominently in businesses all over the world in the coming years.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>VPN services are becoming an almost omnipresent part of the modern Internet, as any assessment of contemporary VPN services &#8211; such as an Avast Secureline review &#8211; will tell you. Keeping up with all of the latest network security information can be challenging, but one approach that you should definitely [&hellip;]<\/p>\n","protected":false},"author":25172,"featured_media":9298,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Zero Trust Security: Taking your cybersecurity policy to the next level","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[15],"tags":[2143,1821],"class_list":["post-9296","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-editorial","tag-cyber-security","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust Security: Taking your cyber security policy to the next level - Armchair Arcade<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust Security: Taking your cyber security policy to the next level - Armchair Arcade\" \/>\n<meta property=\"og:description\" content=\"VPN services are becoming an almost omnipresent part of the modern Internet, as any assessment of contemporary VPN services &#8211; such as an Avast Secureline review &#8211; will tell you. Keeping up with all of the latest network security information can be challenging, but one approach that you should definitely [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/\" \/>\n<meta property=\"og:site_name\" content=\"Armchair Arcade\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-14T17:19:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-14T17:20:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/03\/hacker-2300772_1280.jpg?fit=1280%2C853&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andrei Kuznetsov\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@armchairarcade\" \/>\n<meta name=\"twitter:site\" content=\"@armchairarcade\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrei Kuznetsov\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2019\\\/03\\\/14\\\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2019\\\/03\\\/14\\\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\\\/\"},\"author\":{\"name\":\"Andrei Kuznetsov\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/person\\\/68f1c5d0b3f3e117898e16a924e3a65f\"},\"headline\":\"Zero Trust Security: Taking your cyber security policy to the next level\",\"datePublished\":\"2019-03-14T17:19:12+00:00\",\"dateModified\":\"2019-03-14T17:20:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2019\\\/03\\\/14\\\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\\\/\"},\"wordCount\":1008,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2019\\\/03\\\/14\\\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacker-2300772_1280.jpg?fit=1280%2C853&ssl=1\",\"keywords\":[\"cyber security\",\"cybersecurity\"],\"articleSection\":[\"Editorial\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2019\\\/03\\\/14\\\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2019\\\/03\\\/14\\\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\\\/\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2019\\\/03\\\/14\\\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\\\/\",\"name\":\"Zero Trust Security: Taking your cyber security policy to the next level - Armchair Arcade\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2019\\\/03\\\/14\\\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2019\\\/03\\\/14\\\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacker-2300772_1280.jpg?fit=1280%2C853&ssl=1\",\"datePublished\":\"2019-03-14T17:19:12+00:00\",\"dateModified\":\"2019-03-14T17:20:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2019\\\/03\\\/14\\\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2019\\\/03\\\/14\\\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2019\\\/03\\\/14\\\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacker-2300772_1280.jpg?fit=1280%2C853&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacker-2300772_1280.jpg?fit=1280%2C853&ssl=1\",\"width\":1280,\"height\":853,\"caption\":\"Zero Trust Security: Taking your cyber security policy to the next level\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2019\\\/03\\\/14\\\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust Security: Taking your cyber security policy to the next level\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#website\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\",\"name\":\"Armchair Arcade\",\"description\":\"Chronicling the complete history of videogames, computers, technology, and pop culture since 2003\",\"publisher\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\"},\"alternateName\":\"AA\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\",\"name\":\"Armchair Arcade\",\"alternateName\":\"AA\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Google-250.png?fit=250%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Google-250.png?fit=250%2C250&ssl=1\",\"width\":250,\"height\":250,\"caption\":\"Armchair Arcade\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Armchair-Arcade\\\/141237783007\",\"https:\\\/\\\/x.com\\\/armchairarcade\",\"https:\\\/\\\/instagram.com\\\/bill_loguidice\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/billloguidice\",\"https:\\\/\\\/www.pinterest.com\\\/billloguidice\\\/armchair-arcade\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/BillLoguidice\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/person\\\/68f1c5d0b3f3e117898e16a924e3a65f\",\"name\":\"Andrei Kuznetsov\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Google-250.png?fit=96%2C96&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Google-250.png?fit=96%2C96&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Google-250.png?fit=96%2C96&ssl=1\",\"caption\":\"Andrei Kuznetsov\"},\"description\":\"Correspondent for Armchair Arcade.\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/author\\\/andrei-kuznetsov\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust Security: Taking your cyber security policy to the next level - Armchair Arcade","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust Security: Taking your cyber security policy to the next level - Armchair Arcade","og_description":"VPN services are becoming an almost omnipresent part of the modern Internet, as any assessment of contemporary VPN services &#8211; such as an Avast Secureline review &#8211; will tell you. Keeping up with all of the latest network security information can be challenging, but one approach that you should definitely [&hellip;]","og_url":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/","og_site_name":"Armchair Arcade","article_publisher":"https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007","article_published_time":"2019-03-14T17:19:12+00:00","article_modified_time":"2019-03-14T17:20:48+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/03\/hacker-2300772_1280.jpg?fit=1280%2C853&ssl=1","type":"image\/jpeg"}],"author":"Andrei Kuznetsov","twitter_card":"summary_large_image","twitter_creator":"@armchairarcade","twitter_site":"@armchairarcade","twitter_misc":{"Written by":"Andrei Kuznetsov","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/#article","isPartOf":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/"},"author":{"name":"Andrei Kuznetsov","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/person\/68f1c5d0b3f3e117898e16a924e3a65f"},"headline":"Zero Trust Security: Taking your cyber security policy to the next level","datePublished":"2019-03-14T17:19:12+00:00","dateModified":"2019-03-14T17:20:48+00:00","mainEntityOfPage":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/"},"wordCount":1008,"commentCount":1,"publisher":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#organization"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/03\/hacker-2300772_1280.jpg?fit=1280%2C853&ssl=1","keywords":["cyber security","cybersecurity"],"articleSection":["Editorial"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/","url":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/","name":"Zero Trust Security: Taking your cyber security policy to the next level - Armchair Arcade","isPartOf":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/#primaryimage"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/03\/hacker-2300772_1280.jpg?fit=1280%2C853&ssl=1","datePublished":"2019-03-14T17:19:12+00:00","dateModified":"2019-03-14T17:20:48+00:00","breadcrumb":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/#primaryimage","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/03\/hacker-2300772_1280.jpg?fit=1280%2C853&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/03\/hacker-2300772_1280.jpg?fit=1280%2C853&ssl=1","width":1280,"height":853,"caption":"Zero Trust Security: Taking your cyber security policy to the next level"},{"@type":"BreadcrumbList","@id":"https:\/\/armchairarcade.com\/perspectives\/2019\/03\/14\/zero-trust-security-taking-your-cyber-security-policy-to-the-next-level\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/armchairarcade.com\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Zero Trust Security: Taking your cyber security policy to the next level"}]},{"@type":"WebSite","@id":"https:\/\/armchairarcade.com\/perspectives\/#website","url":"https:\/\/armchairarcade.com\/perspectives\/","name":"Armchair Arcade","description":"Chronicling the complete history of videogames, computers, technology, and pop culture since 2003","publisher":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#organization"},"alternateName":"AA","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/armchairarcade.com\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/armchairarcade.com\/perspectives\/#organization","name":"Armchair Arcade","alternateName":"AA","url":"https:\/\/armchairarcade.com\/perspectives\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Google-250.png?fit=250%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Google-250.png?fit=250%2C250&ssl=1","width":250,"height":250,"caption":"Armchair Arcade"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007","https:\/\/x.com\/armchairarcade","https:\/\/instagram.com\/bill_loguidice\/","https:\/\/www.linkedin.com\/in\/billloguidice","https:\/\/www.pinterest.com\/billloguidice\/armchair-arcade\/","https:\/\/www.youtube.com\/user\/BillLoguidice\/"]},{"@type":"Person","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/person\/68f1c5d0b3f3e117898e16a924e3a65f","name":"Andrei Kuznetsov","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2016\/12\/Google-250.png?fit=96%2C96&ssl=1","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2016\/12\/Google-250.png?fit=96%2C96&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2016\/12\/Google-250.png?fit=96%2C96&ssl=1","caption":"Andrei Kuznetsov"},"description":"Correspondent for Armchair Arcade.","url":"https:\/\/armchairarcade.com\/perspectives\/author\/andrei-kuznetsov\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/03\/hacker-2300772_1280.jpg?fit=1280%2C853&ssl=1","jetpack-related-posts":[{"id":10097,"url":"https:\/\/armchairarcade.com\/perspectives\/2019\/09\/15\/how-vpn-technology-helps-your-daily-lifestyle\/","url_meta":{"origin":9296,"position":0},"title":"How VPN Technology Helps Your Daily Lifestyle","author":"Abigail Massimo","date":"September 15, 2019","format":false,"excerpt":"A VPN is one of those things that come up every once in a while in conversation. Some of us may know what it is. But for the vast majority of us, it\u2019s just computer jargon that stands for\u2014who knows. Well, as time has shown, a VPN isn\u2019t just for\u2026","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"How VPN Technology Helps Your Daily Lifestyle","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/randall-bruder-3_I4NVI9d1k-unsplash.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/randall-bruder-3_I4NVI9d1k-unsplash.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/randall-bruder-3_I4NVI9d1k-unsplash.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/randall-bruder-3_I4NVI9d1k-unsplash.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/randall-bruder-3_I4NVI9d1k-unsplash.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":10116,"url":"https:\/\/armchairarcade.com\/perspectives\/2019\/09\/23\/how-to-protect-your-business-against-cyber-attacks\/","url_meta":{"origin":9296,"position":1},"title":"How To Protect Your Business Against Cyber Attacks","author":"Jane Smith","date":"September 23, 2019","format":false,"excerpt":"If you don\u2019t pay attention to cyber security, you could lose your small business. Follow these tips to protect your small business against cyber attacks.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"How To Protect Your Business Against Cyber Attacks","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/cyber_01.jpg?fit=1200%2C801&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/cyber_01.jpg?fit=1200%2C801&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/cyber_01.jpg?fit=1200%2C801&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/cyber_01.jpg?fit=1200%2C801&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/09\/cyber_01.jpg?fit=1200%2C801&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":8825,"url":"https:\/\/armchairarcade.com\/perspectives\/2018\/12\/19\/what-to-love-about-vpn-connections\/","url_meta":{"origin":9296,"position":2},"title":"What to Love about VPN Connections","author":"Jonathan Adams","date":"December 19, 2018","format":false,"excerpt":"The Internet has made a lot of things more convenient for users. It has created a global village, virtually eliminating distance, and where information is readily accessible for anyone who seeks it. With U.S. mobile connectivity averaging 10.7 Mbps, imagining the things that you can do with all that power\u2026","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"What to Love about VPN Connections","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/12\/pexels-photo-926984.jpeg?fit=1200%2C748&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/12\/pexels-photo-926984.jpeg?fit=1200%2C748&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/12\/pexels-photo-926984.jpeg?fit=1200%2C748&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/12\/pexels-photo-926984.jpeg?fit=1200%2C748&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/12\/pexels-photo-926984.jpeg?fit=1200%2C748&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":9968,"url":"https:\/\/armchairarcade.com\/perspectives\/2019\/08\/28\/best-vpn-services\/","url_meta":{"origin":9296,"position":3},"title":"Best VPN services","author":"Jonathan Adams","date":"August 28, 2019","format":false,"excerpt":"When exploring the web, there's nothing better than knowing that your connection is always private and secure. That isn\u2019t always the case though, as you'd need to be running on a virtual private network (VPN) to accomplish having a private network. From its name, you can pretty much tell what\u2026","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"Best VPN services","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/08\/pexels-photo-2064586.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/08\/pexels-photo-2064586.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/08\/pexels-photo-2064586.jpeg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/08\/pexels-photo-2064586.jpeg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2019\/08\/pexels-photo-2064586.jpeg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":185612,"url":"https:\/\/armchairarcade.com\/perspectives\/2024\/01\/24\/fortifying-the-virtual-fortress\/","url_meta":{"origin":9296,"position":4},"title":"Fortifying the Virtual Fortress: Cybersecurity, Crypto Payments, and the Shielding of Online Casino Platforms","author":"Jane Smith","date":"January 24, 2024","format":false,"excerpt":"his article delves into the evolving landscape of cyber threats, the role of cryptocurrency in online transactions, and the measures taken by online casinos to ensure a secure gaming environment.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"Cryptocurrency security - Generated with AI","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":187943,"url":"https:\/\/armchairarcade.com\/perspectives\/2024\/11\/05\/gaming-with-and-without-a-vpn\/","url_meta":{"origin":9296,"position":5},"title":"Gaming With and Without a VPN: Pros and Cons","author":"Andrei Kuznetsov","date":"November 5, 2024","format":false,"excerpt":"Using a VPN also comes with its own set of advantages and disadvantages. The decision to use a VPN could significantly influence your overall gaming experience in several different ways.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"Gamer in silhouette against a computer","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/11\/computer-3923644_1280.jpg?fit=1200%2C857&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/11\/computer-3923644_1280.jpg?fit=1200%2C857&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/11\/computer-3923644_1280.jpg?fit=1200%2C857&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/11\/computer-3923644_1280.jpg?fit=1200%2C857&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/11\/computer-3923644_1280.jpg?fit=1200%2C857&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/p5dH5R-2pW","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts\/9296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/users\/25172"}],"replies":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/comments?post=9296"}],"version-history":[{"count":0,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts\/9296\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/media\/9298"}],"wp:attachment":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/media?parent=9296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/categories?post=9296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/tags?post=9296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}