{"id":40850,"date":"2021-05-12T13:00:08","date_gmt":"2021-05-12T13:00:08","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=93425"},"modified":"2021-05-12T13:00:08","modified_gmt":"2021-05-12T13:00:08","slug":"how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/","title":{"rendered":"How to secure your hybrid work world with a Zero Trust approach"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/05\/CLO20b_Madeleine_office_009.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>We are operating in the most complex cybersecurity landscape we\u2019ve ever seen. Sophisticated and determined attackers are the norm. And we all are preparing for the next great disruption\u2014hybrid work.<\/p>\n<p>Security has never been more important, and as I shared in <a href=\"https:\/\/www.microsoft.com\/security\/blog\/?p=93424\" target=\"_blank\" rel=\"noopener noreferrer\">another Security blog today<\/a>, it\u2019s clearer than ever that a Zero Trust approach, which basically means you have to assume breach, will be critical to success. We\u2019ve been listening and working closely with our customers around the world and rapidly innovating to help you to secure and protect your organizations. Today, I\u2019d like to share some of our latest updates across security, compliance, identity, and management in response to that feedback to help you in your <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust<\/a> journey.<\/p>\n<h2>Strengthening your Zero Trust approach across your environment<\/h2>\n<p>The hybrid work environment, with some users working remotely and others in group office settings, introduces more digital attack surfaces, complexity, and risk as perimeters are now increasingly fluid. As such, a Zero Trust strategy will be top of mind for many organizations because its principles\u2014verify explicitly, grant least privileged access, and assume breach\u2014help maintain security amid the IT complexity that comes with hybrid work.<\/p>\n<h2>Verify explicitly<\/h2>\n<p>One of the most important first steps in a Zero Trust journey is to establish strong authentication. As Bret Arsenault, Microsoft\u2019s CISO would say, \u201cHackers don\u2019t break in. They log in.\u201d Regardless of length or complexity, passwords alone won\u2019t protect your account in the majority of attacks. Monitoring logins for suspicious activity and limiting or blocking access until additional proof of identity is presented drastically reduces the chances of a breach. Modern multifactor authentication (MFA) doesn\u2019t have to be complicated for the user. We recently announced <a href=\"https:\/\/aka.ms\/gopasswordless\" target=\"_blank\" rel=\"noopener noreferrer\">passwordless authentication<\/a> and <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/temporary-access-pass-is-now-in-public-preview\/ba-p\/1994702\" target=\"_blank\" rel=\"noopener noreferrer\">Temporary Access Pass<\/a> in Azure Active Directory (Azure AD), our cloud identity solution, to help customers strengthen their access controls and simplify the user experience.<\/p>\n<p>Verifying explicitly requires the ability to make real-time access decisions based on all available information for any user trying to access any resource. For us, <strong>Azure AD Conditional Access<\/strong> is this real-time access policy engine, which looks at all the data and signals related to the user gaining access, and today we\u2019re announcing powerful new features that give admins more granular access controls while making it easier to control a growing list of policies. The GPS-based named locations and filters for devices enable a new set of scenarios, such as restricting access from specific countries or regions based on GPS location and securing the use of devices from Surface Hubs to privileged access workstations.<\/p>\n<p>Additionally, to empower security for all, you need to be able to verify explicitly for all. We are expanding granular adaptive access controls to all users with the general availability of Azure AD Conditional Access and Identity Protection for business-to-consumer (B2C) apps&nbsp;and users. And we\u2019ve made it easier to manage all your new policies with new search, sort, and filter capabilities, as well as enhanced audit logs to track recent policy changes. You can learn more on the <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/bg-p\/Identity\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Active Directory Identity blog<\/a>.<\/p>\n<p>We also believe that for comprehensive protection through Zero Trust, we need to have end-to-end integration across device management and identity. New today, we are announcing the preview of filters for devices in Microsoft Endpoint Manager. These unique integrated capabilities between Microsoft Endpoint Manager (which brings together Configuration Manager and Intune) and Azure AD Conditional Access create even more granular controls. With device filters, administrators can target policies and applications to users on specific devices. For example, you can assign a filter so that a policy restriction is only applied to Surface Pro devices. You can learn more in today\u2019s <a href=\"https:\/\/aka.ms\/EndptMgrIntuneFilters\" target=\"_blank\" rel=\"noopener noreferrer\">Tech Community blog<\/a>.<\/p>\n<p>Healthy devices and unified device management across platforms continue to be anchors of Zero trust, and to help protect data from potential leakage on mobile devices; we are introducing <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/intune-customer-success\/app-protection-policy-conditional-launch-improvements\/ba-p\/2209022\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>new conditional launch settings<\/strong><\/a><strong> with App Protection Policies in Microsoft Endpoint Manager<\/strong>. These controls can block access or wipe data based on conditions such as maximum OS version, jailbroken or rooted devices, or require Android devices to pass SafetyNet attestation.<\/p>\n<p>In addition, we are making it easier for you to manage your devices, regardless of the operating system. First, you can configure Android Enterprise-enrolled devices with Azure AD <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/develop\/msal-shared-devices\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>shared device mode<\/strong><\/a><strong> in Microsoft Endpoint Manager. <\/strong>This new capability is now generally available and provides a simplified and more secure experience on devices shared across multiple users. With single sign-in, single sign-out, and data clearing across applications, shared device mode increases privacy between users and reduces the number of steps a frontline worker needs to take to access their work apps.<\/p>\n<p>Then to make it easier to manage and secure your Apple devices, we recently released a Microsoft Endpoint Manager <strong>preview of the Setup Assistant for iOS, iPadOS, and macOS <\/strong>automated device enrollment. Based on customer feedback, you can now allow users to start using their iPadOS device immediately after enrollment without waiting for the Company Portal to install on a locked-down device. You can also configure a Conditional Access policy to require multifactor authentication either during enrollment in the Setup Assistant or upon authentication in the Company Portal. Learn more about the administrator and user experiences for shared devices and Setup Assistance in this <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-endpoint-manager-blog\/what-s-new-in-microsoft-endpoint-manager-2104-april-edition\/ba-p\/2175209\" target=\"_blank\" rel=\"noopener noreferrer\">Tech Community blog<\/a>.<\/p>\n<p>Finally, we continue to invest in <strong>BitLocker<\/strong>, which helps you to protect data at rest. BitLocker now has several enhancements, such as comprehensive modern management with Microsoft Endpoint Manager, role-based access controls for BitLocker recovery passwords, recovery password search, and recovery password auditing. Check out <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/intune-customer-success\/configuring-bitlocker-encryption-with-endpoint-security\/ba-p\/2283101\" target=\"_blank\" rel=\"noopener noreferrer\">our BitLocker series<\/a> that explains how to manage BitLocker in Microsoft Endpoint Manager, such as enabling silent encryption.<\/p>\n<h2>Grant least privileged access<\/h2>\n<p>As we have entered into new hybrid work environments, businesses need to think about how they will proactively protect their organizations from the influx of new or \u201cbring your own\u201d (BYO) connected devices\u2014or even new apps that have helped people to work in new ways. This new normal has exposed the most challenging cybersecurity landscape we\u2019ve ever encountered, and the least privileged access ensures that only what must be shared is.<\/p>\n<p>To help, we recently added&nbsp;the&nbsp;ability to <strong>discover and secure unmanaged endpoints&nbsp;and network devices&nbsp;to&nbsp;Microsoft Defender for Endpoint<\/strong>. Once network devices are discovered, security administrators will receive the latest security recommendations and vulnerabilities on them. Discovered endpoints (such as workstations, servers, and mobile devices) can be onboarded to Microsoft Defender for Endpoints, allowing all its deep protection capabilities. You can learn more in the Microsoft Security blog, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/04\/13\/secure-unmanaged-devices-with-microsoft-defender-for-endpoint-now\/\" target=\"_blank\" rel=\"noopener noreferrer\">Secure unmanaged devices with Microsoft Defender for Endpoint now<\/a>.<\/p>\n<p>The early detection of vulnerabilities and misconfiguration is critical to an organization\u2019s overall security posture, and to prevent those weaknesses from being exploited. With our commitment to support multi-platform, the <strong>threat and vulnerability management capabilities in Microsoft Defender for Endpoint now also support Linux OS<\/strong>, giving organizations the ability to view discovered vulnerabilities, assess the latest security recommendations, and issue remediation tasks for Linux devices. With the addition of Linux, threat and vulnerability management now covers all major platforms, including Windows and macOS.<\/p>\n<h2>Assume breach<\/h2>\n<p>Comprehensive security that is multi-platform and multi-cloud with simplification front and center is going to be important for the \u201cassume breach\u201d approach. With that in mind, today we are announcing the <strong>general availability of the converged portal for Microsoft 365 Defender,<\/strong> which unifies and simplifies XDR capabilities for endpoints, email, and collaboration.&nbsp;<strong>For Azure Sentinel, we are announcing solutions,<\/strong> which is a simplified means to deploy connectors, detections, playbooks, and workloads for both first and third-party integrations, all together as one package. To simplify team communications in the Security Operations Center, we now have built-in integration of Microsoft Teams into Azure Sentinel, so now you can create a Teams call directly from an incident.<\/p>\n<p>With threats continuing to get more sophisticated, it is important to have the latest AI and machine learning capabilities at hand to separate important incidents from noise. Customers using Azure Sentinel consistently tell us how useful it is when incidents we raise are closed directly in the product. This quarter, more than 92 percent of incidents produced by Azure Sentinel\u2019s AI were reported as useful by security professionals, which is dramatically higher than industry standards and enables you to focus on what\u2019s important. <strong>Today we are adding new anomaly detections,<\/strong> including User and Entity Behavioral Analytics (UEBA) to Azure Sentinel that are powered by configurable machine learning.&nbsp;These anomalies can be used to provide additional context while hunting or fused with incidents.&nbsp;What\u2019s powerful is that you can configure the variables for the machine learning driven anomalies with just a few clicks to customize for your specific environment.<\/p>\n<p>Today\u2019s hybrid work environment spans multiple platforms, multiple clouds, and on-premises.&nbsp;We recently extended the multi-cloud support in Azure Defender to include not just servers and SQL but also Kubernetes, all using Azure Arc.&nbsp;Azure Security Center remains the only security portal from a cloud vendor with multi-cloud support, including Azure, Amazon Web Services, and Google Cloud Platform<strong>.&nbsp;Today we are announcing that we are extending protection to the application level with the preview of the SAP threat monitoring solution for Azure Sentinel<\/strong>.&nbsp;This supports SAP running in any cloud or on-premises and includes continuous monitoring of SAP with built-in detections and can be customized to your specific SAP environment. You can learn more about this and the rest of Azure Sentinel\u2019s announcements in the <a href=\"https:\/\/aka.ms\/sentinel-rsa-2021\" target=\"_blank\" rel=\"noopener noreferrer\">Tech Community blog post<\/a>.<\/p>\n<p>Enabling a secure way to access cloud apps while protecting your resources in this hybrid work environment is critical. <strong>New enhancements to Microsoft Cloud App Security<\/strong> will help protect against recent cloud-based attack types by detecting suspicious app activity and data exfiltration attempts from cloud services. Over the next few weeks, the general availability of the integration between Microsoft Information Protection and Cloud App Security will also be available. This integrated information protection policy management from the Cloud App Security portal enables greater visibility, control, and protection for your sensitive data in the cloud.<\/p>\n<p>With over 90 percent of threats surfacing through email, it\u2019s critical that organizations can configure security tools in a way that works for their environment. Over time, settings can age, new attack scenarios develop, and new security controls are available, necessitating regular review, upkeep, modifications, and even removal of old configurations. We\u2019ve been on a journey to make it easier for customers to understand configuration gaps in their environment with <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-defender-for-office\/mastering-configuration-in-defender-for-office-365-part-one\/ba-p\/2300064\" target=\"_blank\" rel=\"noopener noreferrer\">recently launched features<\/a> like <strong>preset security policies, Configuration Analyzer, and override alerts in Microsoft Defender for Office 365<\/strong>. Essentially, when Microsoft is confident that an email contains malicious content, we will not deliver the message to users, regardless of tenant configuration.&nbsp;We also recently announced our <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-defender-for-office\/mastering-configuration-in-defender-for-office-365-part-two\/ba-p\/2307134\" target=\"_blank\" rel=\"noopener noreferrer\">Secure by Default capabilities<\/a> that eliminate the risks posed by legacy configurations. You can learn more in today\u2019s <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-defender-for-office\/mastering-configuration-in-defender-for-office-365-part-one\/ba-p\/2300064\" target=\"_blank\" rel=\"noopener noreferrer\">Tech Community blog post<\/a>.<\/p>\n<p>But \u201cassuming breach\u201d isn\u2019t just about external threats\u2014you also have to be thoughtful about protecting your organization from the inside out. We released new capabilities today in our Insider Risk Management solution to help you to address insider risk in a holistic, collaborative way. Today\u2019s <a href=\"https:\/\/aka.ms\/insiderriskblog\" target=\"_blank\" rel=\"noopener noreferrer\">Tech Community blog<\/a> has more details.<\/p>\n<p>For investigations, eDiscovery is critical. Today we\u2019re announcing that <strong>eDiscovery support for Microsoft Graph connectors<\/strong> will be available in Summer 2021 as a developer preview. With Microsoft Graph connectors, investigators can query across more than 130 systems\u2014directly from Microsoft 365 and our partners. Use the same eDiscovery tools in Microsoft 365 to search for content in third-party systems connected to Microsoft Search as used to search for content in Microsoft 365 apps and services. You can learn more in today\u2019s <a href=\"http:\/\/aka.ms\/microsoftsearch\/connectors\" target=\"_blank\" rel=\"noopener noreferrer\">Tech Community blog post<\/a>.<\/p>\n<h2>Your Zero Trust journey<\/h2>\n<p>In a risk landscape as complex as today\u2019s, your adoption of a Zero Trust approach won\u2019t happen overnight. It\u2019s important to value progress over perfection and to enlist help when you need it. Microsoft and its partners are committed to helping you on this journey. To chart out your path, or assess your progress, <a href=\"https:\/\/aka.ms\/ZeroTrust\" target=\"_blank\" rel=\"noopener noreferrer\">enable a remote workforce by embracing Zero Trust security<\/a>.<\/p>\n<p>Thank you for being part of our community and doing your part to build a safer world.<\/p>\n<h2>Learn more about Microsoft Security<\/h2>\n<p>To learn more about Microsoft Security solutions, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/05\/12\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are operating in the most complex cybersecurity landscape we\u2019ve ever seen. Sophisticated and determined attackers are the norm. And we all are preparing for the next great disruption\u2014hybrid work.<br \/>\nThe post How to secure your hybrid work world with a Zero Trust approach appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":40851,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[6426,347,6427,3677],"class_list":["post-40850","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-azure-security","tag-cybersecurity","tag-office-365-security","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to secure your hybrid work world with a Zero Trust approach 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to secure your hybrid work world with a Zero Trust approach 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-12T13:00:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How to secure your hybrid work world with a Zero Trust approach\",\"datePublished\":\"2021-05-12T13:00:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\\\/\"},\"wordCount\":2123,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach.jpg\",\"keywords\":[\"Azure Security\",\"Cybersecurity\",\"Office 365 Security\",\"Zero Trust\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\\\/\",\"name\":\"How to secure your hybrid work world with a Zero Trust approach 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach.jpg\",\"datePublished\":\"2021-05-12T13:00:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Security\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/azure-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to secure your hybrid work world with a Zero Trust approach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to secure your hybrid work world with a Zero Trust approach 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/","og_locale":"en_US","og_type":"article","og_title":"How to secure your hybrid work world with a Zero Trust approach 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-05-12T13:00:08+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How to secure your hybrid work world with a Zero Trust approach","datePublished":"2021-05-12T13:00:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/"},"wordCount":2123,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach.jpg","keywords":["Azure Security","Cybersecurity","Office 365 Security","Zero Trust"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/","url":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/","name":"How to secure your hybrid work world with a Zero Trust approach 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach.jpg","datePublished":"2021-05-12T13:00:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/azure-security\/"},{"@type":"ListItem","position":3,"name":"How to secure your hybrid work world with a Zero Trust approach"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40850"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40850\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/40851"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}