by Sateesh Narahari, for AiThority
For many organizations, cloud computing and the use of cloud applications is the new norm. Employees are using their email and files while on the road—using both personal and business devices—because the cloud makes data available from anywhere there is an internet connection.
At the same time, organizations are falling victim to high-profile data breaches, exposing employee and customer personally identifiable information (PII) and payment card industry (PCI) data. This data is now being used by hackers in account takeover attacks, phishing schemes and more. This means that the same cloud applications giving employees the freedom to work and access company data from anywhere now pose a problem for traditional security techniques. A “secure perimeter” is a thing of the past. Companies are instead adopting what many in the security industry call a zero trust security model.