{"id":49389,"date":"2022-11-17T16:56:28","date_gmt":"2022-11-17T16:56:28","guid":{"rendered":"https:\/\/www.darkreading.com\/endpoint\/zero-trust-initiatives-stall-cyberattack-costs-1m-per-incident"},"modified":"2022-11-17T16:56:28","modified_gmt":"2022-11-17T16:56:28","slug":"zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/","title":{"rendered":"Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf474854ec003d901\/61fd4828fa784a36bcaba941\/Cyberattack_Skorzewiak_Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Organizations are struggling with mounting data losses, increased downtime, and rising recovery costs due to cyberattacks&nbsp;\u2014 to the tune of $1.06 million in costs per incident. Meanwhile,&nbsp;IT security staffs are stalled on getting defenses up to speed.<\/p>\n<p>That&#8217;s according to the 2022 <a href=\"https:\/\/www.dell.com\/en-us\/dt\/data-protection\/gdpi\/index.htm\" target=\"_blank\" rel=\"noopener\">Dell Global Data Protection Index (GDPI)<\/a> survey of 1,000 IT decision-makers across 15 countries and 14 industries, which found that organizations that experienced disruption have also suffered an average of 2TB data loss and 19 hours of downtime.&nbsp;<\/p>\n<p>Most respondents (67%) said they lack confidence that their existing data protection measures are sufficient to cope with malware and ransomware threats. A full 63% said they are not very confident that all business-critical data can be reliably recovered in the event of a destructive cyberattack.<\/p>\n<p>Their fears seem founded:&nbsp;Nearly half of respondents (48%) experienced a cyberattack in the past 12 months&nbsp;that prevented access to their data (a 23% increase from 2021) \u2014 and that&#8217;s&nbsp;a trend that&nbsp;Colm Keegan, senior consultant for data protection solutions at Dell Technologies, says will likely continue.&nbsp;<\/p>\n<p>&#8220;The growth and increased distribution of data across edge, core data center and <a href=\"https:\/\/www.darkreading.com\/cloud\/cyberattackers-compromise-most-cloud-data-3-steps\" target=\"_blank\" rel=\"noopener\">multiple public cloud environments<\/a> are making it exceedingly difficult for IT admins to protect their data,&#8221; Keegan explains.<\/p>\n<p>On the protection front, most organizations are falling behind; for instance,&nbsp;91% are aware of or planning to deploy a zero-trust architecture, but only 12% are fully deployed.<\/p>\n<p>And it&#8217;s not just advanced defense that&#8217;s lacking: Keegan points out that&nbsp;69% of respondents stated they simply cannot meet their backup windows to be prepared for a ransomware attack.<\/p>\n<h2 class=\"regular-text\">Data Protection Strategies Face Headwinds<\/h2>\n<p>One of the primary reasons data protection strategies are failing is <a href=\"https:\/\/www.darkreading.com\/edge-articles\/distrust-and-verify-why-comprehensive-network-visibility-is-required-for-mature-zero-trust-architectures\" target=\"_blank\" rel=\"noopener\">the lack of visibility<\/a> of where that data resides and what it is \u2014 a problem&nbsp;exacerbated by the&nbsp;rapid, ongoing&nbsp;adoption of cloud-native apps and containers. More than three-quarters of survey respondents said there is a lack of common data protection solutions for these newer technologies.<\/p>\n<p>&#8220;Seventy-two percent said they are unable to keep up with what their developers are doing in the cloud \u2014 it\u2019s basically a blind spot for them,&#8221; Keegan says.<\/p>\n<p>Claude Mandy, chief evangelist of data security at Symmetry Systems, a provider of hybrid cloud data security solutions, agrees that a&nbsp;lack of visibility is the primary reason current data-protection strategies fail.<\/p>\n<p>&#8220;Organizations simply do not know what data they have, where it is, let alone how it is protected,&#8221; he says. &#8220;Unfortunately, a lot of the data-protection failures are preventable by simply knowing the answers to these questions.&#8221;<\/p>\n<p>He adds that the problem&nbsp;is worsened by the constant change of data within an organization. From his perspective, the sheer scale and complexity of millions of individual data objects across thousands of data stored in multiple clouds, multiplied by a seemingly infinite combination of roles and permissions for thousands of user and machine identities, would be challenging for chief information security officers (CISOs) to secure even if they were static. They&#8217;re not, so the situation is even more challenging.<\/p>\n<p>To boot, in a lot of cases, organizations are&nbsp;using multiple data security tools for different silos of information,&nbsp;with no overarching integration between them.<\/p>\n<p>&#8220;The billions of objects form over months or years, and change constantly,&#8221; Mandy says. &#8220;This is further exacerbated through continuous data flows, privilege creep, data sprawl, and organizational churn, resulting in [visibility] to data that is far from ideal.&#8221;<\/p>\n<h2 class=\"regular-text\">Zero-Trust Implementation Lags, Despite Interest<\/h2>\n<p>Zero trust is <a href=\"https:\/\/www.darkreading.com\/dr-tech\/reducing-risk-with-zero-trust\" target=\"_blank\" rel=\"noopener\">growing in popularity<\/a> in enterprise security because not trusting users by default works well to reduce risk. Indeed, virtually all the GDPI respondents indicated they intend to implement zero trust into their environments at some point.<\/p>\n<p>However, actual deployment is not happening at a rapid pace \u2014 as mentioned,&nbsp;only 12% of respondents indicated they have fully deployed at zero-trust architecture into their environments. According to researchers, the main problem is a critical shortfall in IT skills, particularly as it relates to cyber recovery and data protection.<\/p>\n<p>Widely reported shortages of trained cybersecurity professionals are driving the industry to try to come up with some with creative recruiting and training solutions, but just 65 cybersecurity professionals are in the workforce for every 100 available jobs, <a href=\"https:\/\/www.darkreading.com\/cloud\/cybersecurity-s-hiring-spree-is-going-to-require-recruitment-rethink\" target=\"_blank\" rel=\"noopener\">a recent study shows<\/a>.<\/p>\n<p>&#8220;If you don\u2019t have cybersecurity professionals on staff, it\u2019s virtually impossible to make progress on deploying a zero-trust framework, unless, of course, you rely on partners to help you get there,&#8221; Keegan says. &#8220;Now consider the demand for these resources in the market. Like supply chain constraints, demand is high, and the supply is low.&#8221;<\/p>\n<p>Patrick Tiquet, vice president of security and architecture at Keeper Security, a provider of zero-trust and zero-knowledge cybersecurity software, says that zero-trust management can be challenging even with staff on board.<\/p>\n<p>&#8220;Implementation of [zero trust] is currently a common data-protection strategy,&#8221; he explains. &#8220;However, for [zero trust] to be effective, access and roles must first be configured correctly.&#8221;<\/p>\n<p>This means ensuring the right people have access to the right data and resources within the zero-trust architecture. Roles must be implemented that are adequately scoped to protect the data that role can access \u2014 and correctly configuring access to data just one time (&#8220;set it and forget it,&#8221; in other words) is not enough.<\/p>\n<p>&#8220;The organization must maintain and manage data access through the lifecycle of the data, and as the organization grows,&#8221; Tiquet adds. &#8220;Organizations must make sure that, as teams grow and change, the access given to a specific role is still appropriate.&#8221;<\/p>\n<h2 class=\"regular-text\">Vendor Consolidation on the To-Do List<\/h2>\n<p>Keegan says it\u2019s likely there will be some retooling at organizations in terms of platforms \u2014 many survey respondents (85%) said they believe they would see a benefit through reducing the number of data protection vendors they work with.<\/p>\n<p>&#8220;The research tends to support this sentiment,&#8221; he adds. &#8220;For example, those using a single data protection vendor had far fewer incidents of data loss than those using multiple vendors.&#8221; <\/p>\n<p>Likewise, the cost of data loss incidents resulting from a cyber&nbsp;attack was approximately 34% higher for those organizations working with multiple data protection vendors than those using a single vendor, according to the survey. <\/p>\n<p>John Bambenek, principal threat hunter at Netenrich, a security and operations analytics software-as-a-service (SaaS) company, says the <a href=\"https:\/\/www.darkreading.com\/application-security\/recession-jitters-ma-dominates-robust-cybersecurity-market\" target=\"_blank\" rel=\"noopener\">current spate of M&amp;A and consolidation<\/a> in the cybersecurity market speaks to those drivers \u2014 but warns that vendors trying to be all things to all security problems has its own downsides.<\/p>\n<p>&#8220;The larger tech firms get, the less ability they have to innovate and solve problems leading to opportunities for new vendors to step in with new solutions,&#8221; he explains. &#8220;It&#8217;s [a cycle] we see of M&amp;A frenzy and stagnation, then new companies enter to innovate \u2014 and more M&amp;A.&#8221;<\/p>\n<p>Keegan, meanwhile, says he is hearing calls in the analyst community that organizations need to consider shifting their investments from cybersecurity prevention to resiliency.<\/p>\n<p>&#8220;This means accepting the inevitability that security breaches will occur,&#8221; he notes. &#8220;Moreover, companies need to have a plan that enables them to recover their critical data and business applications in a timely manner to meet their service level objectives.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/endpoint\/zero-trust-initiatives-stall-cyberattack-costs-1m-per-incident\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers find current data protections strategies are failing to get the job done, and IT leaders are concerned, while a lack of qualified IT security talent hampers cyber-defense initiatives.Read More <a href=\"https:\/\/www.darkreading.com\/endpoint\/zero-trust-initiatives-stall-cyberattack-costs-1m-per-incident\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-49389","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-17T16:56:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf474854ec003d901\/61fd4828fa784a36bcaba941\/Cyberattack_Skorzewiak_Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident\",\"datePublished\":\"2022-11-17T16:56:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\\\/\"},\"wordCount\":1208,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltf474854ec003d901\\\/61fd4828fa784a36bcaba941\\\/Cyberattack_Skorzewiak_Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\\\/\",\"name\":\"Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltf474854ec003d901\\\/61fd4828fa784a36bcaba941\\\/Cyberattack_Skorzewiak_Alamy.jpg\",\"datePublished\":\"2022-11-17T16:56:28+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltf474854ec003d901\\\/61fd4828fa784a36bcaba941\\\/Cyberattack_Skorzewiak_Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltf474854ec003d901\\\/61fd4828fa784a36bcaba941\\\/Cyberattack_Skorzewiak_Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/","og_locale":"en_US","og_type":"article","og_title":"Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-11-17T16:56:28+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf474854ec003d901\/61fd4828fa784a36bcaba941\/Cyberattack_Skorzewiak_Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident","datePublished":"2022-11-17T16:56:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/"},"wordCount":1208,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf474854ec003d901\/61fd4828fa784a36bcaba941\/Cyberattack_Skorzewiak_Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/","url":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/","name":"Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf474854ec003d901\/61fd4828fa784a36bcaba941\/Cyberattack_Skorzewiak_Alamy.jpg","datePublished":"2022-11-17T16:56:28+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf474854ec003d901\/61fd4828fa784a36bcaba941\/Cyberattack_Skorzewiak_Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf474854ec003d901\/61fd4828fa784a36bcaba941\/Cyberattack_Skorzewiak_Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-initiatives-stall-as-cyberattack-costs-rocket-to-1m-per-incident\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49389"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49389\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}