Emerging Technologies Driving Zero Trust Maturity Across Industries

Hrishikesh Joshi
{"title":"Emerging Technologies Driving Zero Trust Maturity Across Industries","authors":"Hrishikesh Joshi","doi":"10.1109/OJCS.2024.3505056","DOIUrl":null,"url":null,"abstract":"This study explores the profound impact of emerging technologies on the Zero Trust paradigm and the challenges they present in the evolving cybersecurity landscape. As organizations grapple with increasingly complex threats, the integration of innovative technologies with Zero Trust principles offers both promising solutions and new challenges. The research investigates how artificial intelligence, machine learning, blockchain, quantum computing, and cloud/edge technologies are reshaping the implementation and efficacy of Zero Trust architectures. These technologies enable more sophisticated trust evaluation algorithms, enhanced threat intelligence, and dynamic access control mechanisms, thereby extending the boundaries of traditional Zero Trust models. The rapid pace of innovation introduces complexities in maintaining continuous verification and least-privilege access across hybrid and multi-cloud environments. Furthermore, the integration of AI and machine learning in Zero Trust frameworks raises questions about data privacy, algorithmic bias, and the need for explainable security decisions. The article proposes a methodology for addressing these challenges, emphasizing the need for adaptive Zero Trust strategies that can evolve alongside technological advancements. Through examination of real-world case studies and empirical research, this study provides insights into the practical implications of emerging technologies on Zero Trust implementation. It offers guidance for enterprises on harnessing these technologies to create more resilient, responsive, and effective cybersecurity measures. This research aims to equip organizations with the knowledge and strategies necessary to embrace emerging technologies within a Zero Trust framework, enabling them to navigate the complex interplay between innovation and security in the digital age.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"25-36"},"PeriodicalIF":0.0000,"publicationDate":"2024-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10764723","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of the Computer Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10764723/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This study explores the profound impact of emerging technologies on the Zero Trust paradigm and the challenges they present in the evolving cybersecurity landscape. As organizations grapple with increasingly complex threats, the integration of innovative technologies with Zero Trust principles offers both promising solutions and new challenges. The research investigates how artificial intelligence, machine learning, blockchain, quantum computing, and cloud/edge technologies are reshaping the implementation and efficacy of Zero Trust architectures. These technologies enable more sophisticated trust evaluation algorithms, enhanced threat intelligence, and dynamic access control mechanisms, thereby extending the boundaries of traditional Zero Trust models. The rapid pace of innovation introduces complexities in maintaining continuous verification and least-privilege access across hybrid and multi-cloud environments. Furthermore, the integration of AI and machine learning in Zero Trust frameworks raises questions about data privacy, algorithmic bias, and the need for explainable security decisions. The article proposes a methodology for addressing these challenges, emphasizing the need for adaptive Zero Trust strategies that can evolve alongside technological advancements. Through examination of real-world case studies and empirical research, this study provides insights into the practical implications of emerging technologies on Zero Trust implementation. It offers guidance for enterprises on harnessing these technologies to create more resilient, responsive, and effective cybersecurity measures. This research aims to equip organizations with the knowledge and strategies necessary to embrace emerging technologies within a Zero Trust framework, enabling them to navigate the complex interplay between innovation and security in the digital age.
新兴技术推动各行业零信任成熟度
本研究探讨了新兴技术对零信任范式的深远影响,以及它们在不断发展的网络安全环境中所面临的挑战。随着组织与日益复杂的威胁作斗争,创新技术与零信任原则的集成提供了有希望的解决方案和新的挑战。该研究调查了人工智能、机器学习、区块链、量子计算和云/边缘技术如何重塑零信任架构的实施和有效性。这些技术支持更复杂的信任评估算法、增强的威胁情报和动态访问控制机制,从而扩展了传统零信任模型的边界。创新的快速步伐给跨混合云和多云环境维护持续验证和最低权限访问带来了复杂性。此外,人工智能和机器学习在零信任框架中的集成引发了关于数据隐私、算法偏见以及对可解释的安全决策的需求的问题。本文提出了一种应对这些挑战的方法,强调需要适应零信任策略,这种策略可以随着技术进步而发展。通过对现实世界案例研究和实证研究的考察,本研究提供了新兴技术对零信任实施的实际影响的见解。它为企业提供了利用这些技术来创建更具弹性、响应性和有效性的网络安全措施的指导。本研究旨在为组织提供必要的知识和策略,以在零信任框架内拥抱新兴技术,使他们能够驾驭数字时代创新与安全之间复杂的相互作用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
12.60
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信