The topic can associate to many things

  • The boundary between positive and negative value
  • Calibration for instrumentation integrity
  • Absolute zero (temperature)
  • Zero-day exploit, attack
  • One of the 2 binary digits
  • From zero to hero
  • Zero-trust …

The zero-trust model (or architecture) is chosen here.  In cyber space with zero-trust, every component needs to be re authenticated for trust even if inside the network.  This is to limit lateral movement when adversary once gains access to an insecure node.

This model will reimagine the work process.  Of course, to what degree applying this model will be the trade off of security and productivity plus the risks tolerated.

Leave a Reply