Blog
Topic
All
AIoT
Products and technologies
Industries
All
Logistics
Building
Sustainability
Business trends
Cybersecurity
Events
Trends
Industry News
Company News
Product Announcement
Search blog
Blog
Filter
Cancel
All
AIoT
Products and technologies
Industries
All
Logistics
Building
Sustainability
Business trends
Cybersecurity
Events
Trends
Industry News
Company News
Product Announcement
Reset
Submit

Hikvision Senior Director of Cybersecurity on Using Zero Trust Network to Address Security Concerns

 

In the SecurityInfoWatch.com article, “Trust No One and Trust No IoT Device: A Sound Approach to Enterprise Cybersecurity. The Zero Trust Network is fast becoming a standard among CISOs,” Hikvision senior director of cybersecurity, Chuck Davis, addresses using the Zero Trust Network architecture to improve cybersecurity and address security concerns.

Applying the architecture of Zero Trust is a sound approach to cybersecurity, states Davis. Referencing insights from IBM, network compromises can come from nearly any source, and insider threats “account for 60 percent of cyberattacks.”

“How might an employee or an IoT computer—such as a video surveillance camera—be a conduit for a cybersecurity breach? Consider the enterprise environment. Is the network properly segmented? Can general employees get to servers used by HR or Accounting? Are your video surveillance cameras or other IoT devices on the same network as critical infrastructure? If you answered ‘yes’ to any of the above, you need to take a critical look at your network and digital assets,” said Davis, in the article.

The story talks about how network segmentation is a critical first step for protecting networks and systems. The Zero Trust approach, the story explains, uses micro-segmentation to determine if a user, machine or application can be trusted.

While deploying a Zero Trust Network does present challenges, Davis offered some immediate options to better secure a network. These include implementing network segmentation and teaching employees how to identify phishing attacks.

For more insights from Davis on how to improve network security and reduce concerns, read the entire article at this link.

Cybersecurity

Subscribe to newsletter

Subscribe to our email newsletter to get the latest, trending content from Hikvision

Hikvision.com uses strictly necessary cookies and related technologies to enable the website to function. With your consent, we would also like to use cookies to observe and analyse traffic levels and other metrics / show you targeted advertising / show you advertising on the basis of your location / tailor our website's content. For more information on cookie practices please refer to our cookie policy.

 

Contact Us
Hik-Partner Pro close
Hik-Partner Pro
Security Business Assistant. At Your Fingertips. Learn more
Hik-Partner Pro
Scan and download the app
Hik-Partner Pro
Hik-Partner Pro
back to top

Get a better browsing experience

You are using a web browser we don’t support. Please try one of the following options to have a better experience of our web content.