{"id":44320,"date":"2021-12-08T07:30:08","date_gmt":"2021-12-08T07:30:08","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/"},"modified":"2021-12-08T07:30:08","modified_gmt":"2021-12-08T07:30:08","slug":"whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/","title":{"rendered":"What\u2019s the right amount of trust to build into your network? Less than Zero"},"content":{"rendered":"<p><span data-label=\"promo\">Paid Feature<\/span> \u201cThe trust of the innocent is the liar&#8217;s most useful tool,\u201d Stephen King wrote. At least that\u2019s what the internet claims.<\/p>\n<p>But \u201cproving\u201d the provenance of this quote is surprisingly difficult. That\u2019s the problem with trust. It\u2019s slippery, and when it\u2019s misplaced, the consequences can be catastrophic. As we can see with cybersecurity, time and time again.<\/p>\n<p>The pandemic has highlighted what were already pervasive security issues with trust, corporate networks, and the internet. Home and remote working mean the \u201cnetwork\u201d no longer corresponds to a particular location. This in turn highlights the existing shortcomings of VPNs, (the traditional secure way for remote workers to access the corporate network).<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>The entire model of a VPN is predicated on delivering access to a location whether that location, or network, is on-premises or in the cloud, says Andrew Sinclair, head of product at UK managed services and cloud provider iomart. And this is the problem with traditional credential-based authentication.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>\u201cPeople have been able to connect to a business by using just a username and password. And then once they&#8217;re delivered into the network, it&#8217;s assumed that they&#8217;re trusted.\u201d<\/p>\n<p>But once in, the user, or the criminal who has hijacked their device or identity, has free rein to do whatever they want on that network, Sinclair explains. \u201cThey could scan the whole network, once connected, to uncover anything of interest or can even attempt to access other systems.\u201d<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>This ability for interlopers to indulge in \u201clateral movement\u201d is the \u201cnumber one reason why businesses experience devastating ransomware attacks,\u201d says Sinclair.<\/p>\n<p>This is no abstract challenge. IDC reports that more than a third of businesses have been hit by a ransomware attack, or breach that blocked systems or data, over the last 12 months. \u201cIt&#8217;s by far the biggest conversation piece we&#8217;re having with customers, certainly for the past 24 months,\u201d says Sinclair.<\/p>\n<p>So, where do customers turn?<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>There\u2019s no doubt that customers are being offered what Sinclair describes as \u201cloads of really expensive third party vendor network security.\u201d These will promise not just security but, for example, AI-powered, self-learning security.<\/p>\n<p>But these solutions are expensive. And if they are supplied as an appliance, companies face the issue of not just managing security, but managing the device itself. They could also face the prospect of duplicating that expense and effort at each key location.<\/p>\n<p>But there are even more fundamental challenges with this approach, says Sinclair. \u201cThe problem with these tools is that the focus is policing the business network, under the assumption that the business network is a safe place to be.\u201d<\/p>\n<h3 class=\"crosshead\"> <span>An insecure world without borders<\/span><br \/>\n<\/h3>\n<p>But in reality, businesses may operate across hybrid cloud and multi-cloud, with multiple geographies and multiple clients, without the reassurance that security controls will be consistent. \u201cHow can businesses make sure that their data is constantly secure with TLS over a sprawling network?\u201d asks Sinclair. \u201cIt&#8217;s an incredible challenge.\u201d<\/p>\n<p>And it doesn\u2019t stop there. Because very few users, and their data, exist in a secure enclosed network. Rather, he argues, \u201cThe reality is, your data travels, from AWS, to Azure, to data centres around the globe.\u201d<\/p>\n<p>So, \u201cif you&#8217;re trying to move the internal network back to being in a position of trust, then you\u2019ve already lost.\u201d<\/p>\n<p>Instead, all networks should be considered untrusted and this is the basis of Zero Trust, or the concept of a software defined perimeter. \u201cThe first tenet is that the network is always assumed to be hostile,\u201d he says.<\/p>\n<p>Once you accept that, it\u2019s an easy step to embrace the second tenet. \u201cYou should assume that external and internal threats always exist within your network at all times.\u201d<\/p>\n<p>From there, the third principle is that \u201cthe locality of the network is not sufficient for deciding if a user or a device who&#8217;s connected to that network is trusted or untrusted.\u201d<\/p>\n<p>It\u2019s easy to see how these principles map to other modern network concepts, particularly SD-WAN, which abstracts the network and access to different parts of it, away from the physical infrastructure.<\/p>\n<p>So, what does this mean in practice, for example in the Managed Software Defined Perimeter (SDP) service that iomart provides its customers?<\/p>\n<h3 class=\"crosshead\"> <span>Security, laterally<\/span><br \/>\n<\/h3>\n<p>The starting point for all this with iomart\u2019s service is the installation of an agent on the user&#8217;s Windows, Mac or Linux device.<\/p>\n<p>Then, iomart\u2019s security team \u201cengages with the business and initially does a discovery and tries to identify where all the key points of data are across the business, whether it&#8217;s Microsoft Azure, Amazon or on-premises at the data centre. And then our team designs the architecture and installs the software needed for your users to connect to their applications wherever those users might be. And that\u2019s how the SDP service connects to anywhere.\u201d<\/p>\n<p>And then our team designs the architecture and installs the software needed for your users to connect to their applications wherever those users might be<\/p>\n<p>When it comes to a given user\u2019s device, says Sinclair, \u201cwe can ensure it\u2019s been through the enrolment process, and it&#8217;s an acceptable device. That delivers some extra context.\u201d<\/p>\n<p>\u201cWe can show that the device is healthy, that it&#8217;s fully patched, the anti-malware agent is running, it&#8217;s updated. \u201cWhere the device is logging in from can be another piece of context. After two years logging in from your front room, a sudden log-in from Venezuela should really ring alarm bells.<\/p>\n<p>Beyond that authentication, there\u2019s ensuring the device and user are restricted when they\u2019re \u201cin\u201d the network, to just whatever services or data they need to do their job.<\/p>\n<p>\u201cTrusted users are no longer dropped into the network. They&#8217;re connected directly to the application that they&#8217;ve requested. So, with a single service, the challenges with lateral movement are overcome.\u201d<\/p>\n<p>Whenever there&#8217;s a security challenge, or a problem that alerts the SDP system, iomart\u2019s SDP also writes out to its XDR service, which in turn goes into the company\u2019s security team. The offending device is disconnected from the network, while iomart\u2019s security team will run through a playbook that is customised for each customer.<\/p>\n<p>The triage process is followed by \u201clessons learned, figuring out how the malware got in, was it zero day malware or something similar.\u201d<\/p>\n<p>It\u2019s important to remember that in addition to the SDP agent, says Sinclair, \u201cyou still require some type of anti-malware deep security. We would recommend that whatever agent that you put into is usually some type of XDR agent which, in the event of something going wrong, will report back to a SIEM (security information &amp; event management) system.\u201d<\/p>\n<p>Taken together, this gives admin teams \u201ca surety that there&#8217;s a layer of control &#8211; that perhaps wasn&#8217;t there in the past.\u201d<\/p>\n<p>This applies to people inside the office as well as outside, as the policies apply across the whole business, not a geography.<\/p>\n<p>\u201cThe admin team can be assured that when someone&#8217;s connecting to the network, we know who they are, we know that their device is healthy. And we know that they&#8217;re only going to be connecting to the things that they should be connecting to.\u201d<\/p>\n<p>Embracing this model can be a leap for organisations that previously centred their security strategy on something very clever, and very expensive, back at base. But, Sinclair argues, \u201ca lot of enterprises have spent a lot of money investing in a lot of expensive tools. And they&#8217;re still not sure actually what value that&#8217;s delivering to them.\u201d<\/p>\n<p>Securing the remote user is just as important as advanced security controls on the servers that run the apps, he says, noting that nine out of ten security incursions start at the client level.<\/p>\n<p>Sinclair recommends companies use a mitigation technology that can easily articulate its value.\u201d The cost of an SDP managed service will typically come in at just slightly more per user than the average AV service cost and that means even the smallest business can afford to greatly increase their security posture, he says.<\/p>\n<p>Which brings us back to the purported Stephen King quote about trust. It turns out it is indeed from a Stephen King novel. But proving this is tricky and laborious. That\u2019s another thing about trust. Sometimes it makes sense for someone else to do all the hard work.<\/p>\n<p> <i>Sponsored by iomart.<\/i>\n<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2021\/12\/08\/iomart_zero_trust\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s tricky but manageable, says Iomart Paid Feature\u00a0 \u201cThe trust of the innocent is the liar&#8217;s most useful tool,\u201d Stephen King wrote. At least that\u2019s what the internet claims.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-44320","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What\u2019s the right amount of trust to build into your network? Less than Zero 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s the right amount of trust to build into your network? Less than Zero 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-08T07:30:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"What\u2019s the right amount of trust to build into your network? Less than Zero\",\"datePublished\":\"2021-12-08T07:30:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\\\/\"},\"wordCount\":1435,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\\\/\",\"name\":\"What\u2019s the right amount of trust to build into your network? Less than Zero 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2021-12-08T07:30:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What\u2019s the right amount of trust to build into your network? Less than Zero\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s the right amount of trust to build into your network? Less than Zero 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/","og_locale":"en_US","og_type":"article","og_title":"What\u2019s the right amount of trust to build into your network? Less than Zero 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-08T07:30:08+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"What\u2019s the right amount of trust to build into your network? Less than Zero","datePublished":"2021-12-08T07:30:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/"},"wordCount":1435,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/","url":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/","name":"What\u2019s the right amount of trust to build into your network? Less than Zero 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2021-12-08T07:30:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YbCn2d2UYpFt6zj0FE0TCQAAAI8&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/whats-the-right-amount-of-trust-to-build-into-your-network-less-than-zero\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"What\u2019s the right amount of trust to build into your network? Less than Zero"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44320"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44320\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}