Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The NexPhone is a working product that runs both Windows and Android

    Tesla Malaysia unleases Model 3 Standard RWD and Model Y Long Range RWD

    6 billion leaked passwords reveal the ones you should never, ever use

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Ashley St. Clair, the mother of one of Elon Musk’s children, sues xAI over Grok sexual images

      January 17, 2026

      Anthropic joins OpenAI’s push into health care with new Claude tools

      January 12, 2026

      The mother of one of Elon Musk’s children says his AI bot won’t stop creating sexualized images of her

      January 7, 2026

      A new pope, political shake-ups and celebs in space: The 2025-in-review news quiz

      December 31, 2025

      AI has become the norm for students. Teachers are playing catch-up.

      December 23, 2025
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      Monero Holds $500, But Rising Risk Emerges as Traders Pull Back

      January 23, 2026

      US DOJ Recasts Crypto as Fraud Infrastructure in New Review

      January 23, 2026

      Where Is Ethereum’s Bottom? Analysts Weigh On-Chain and Technical Signals

      January 23, 2026

      Ledger To Turn Crypto Security into Wall Street Gold in $4 Billion IPO

      January 23, 2026

      Can XRP HODLer Conviction Beat Profit Booking and the 18% Price Breakdown Risk?

      January 23, 2026
    • Technology

      6 billion leaked passwords reveal the ones you should never, ever use

      January 23, 2026

      A Lenovo update hints at Nvidia Arm CPUs coming soon

      January 23, 2026

      7 awesome Philips Hue smart light features you’re not using

      January 23, 2026

      Nintendo made a real Talking Flower and it won’t stop talking

      January 23, 2026

      Raspberry Pi launches a USB flash drive that won’t flake under pressure

      January 23, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Zero-trust is redefining cyber security in 2025
    Technology

    Zero-trust is redefining cyber security in 2025

    TechAiVerseBy TechAiVerseMay 30, 2025No Comments5 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Zero-trust is redefining cyber security in 2025
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Zero-trust is redefining cyber security in 2025

    The future of zero-trust is about embedding resilience into every facet of an organisation. To achieve this, SRM leaders must reimagine their strategies to address emerging challenges and prioritise key areas.

    By

    • Dale Koeppen, Gartner

    Published: 29 May 2025

    Cyber security has long been likened to building a fortress: thick walls, watchtowers, and a moat separating the inside from the outside. This perimeter-focused approach thrived for decades, but in today’s hyper-connected digital world, resources and users extend beyond traditional fortress boundaries, providing attackers with expanded opportunities for engagement. Recent cyber attacks have only underscored the inadequacy of traditional methods, revealing just how vulnerable organisations remain in a dynamic threat landscape.

    Zero-trust flips the fortress mindset on its head. It operates under a simple but transformative principle: assume the presences of hostiles actors, always establish and validate identity, and limit access to resources. As cyber threats evolve daily and data sprawls across clouds, applications, and devices, zero-trust has become today a strategic imperative for security and risk management (SRM) leaders.

    The future state of zero-trust: A blueprint for 2025

    The future of zero-trust is about embedding resilience into every facet of an organisation. To achieve this, SRM leaders must reimagine their strategies to address emerging challenges and prioritise key areas.

    Identity remains the cornerstone of zero-trust. In 2025, SRM leaders must double down on robust identity verification mechanisms, such as multi-factor authentication, continuous monitoring, and risk-based adaptive access controls. This ensures that both human and machine identities are rigorously validated at every access point. Organisations must also refine their policies to implement least-privilege access on a broader scale. This includes dynamic, context-aware permissions that adjust in real time based on user behaviour, device integrity, and location.

    The ripple effect of recent cyber attacks

    In the wake of high-profile breaches targeting critical infrastructure and sensitive data, the urgency for zero-trust has reached a tipping point. These attacks have exposed systemic vulnerabilities, including over-reliance on perimeter defences and poor segmentation practices. They’ve also highlighted the growing sophistication of threat actors, who exploit the smallest gaps in security postures, most notably in cloud environments.

    Despite growing recognition of zero-trust, success remains elusive for many. A recent Gartner survey revealed that while 63% of organisations had either attempted or partially implemented a zero-trust initiative, 35% reported failures that adversely impacted their operations. These findings emphasise the importance of strategic alignment, clear communication, and iterative execution to avoid common pitfalls and achieve meaningful progress.

    The lessons from these incidents are clear: static defences are no match for adaptive adversaries. Organisations that fail to evolve their strategies risk not only financial losses but also reputational damage and regulatory scrutiny. Zero-trust offers a path forward by shifting the focus from “if” an attack will happen to “when,” ensuring that breaches are contained and impact minimised.

    Why we need zero-trust now more than ever

    The conversation around zero-trust has shifted. It’s no longer just a theoretical ideal or a buzzword, it’s a necessity. The convergence of hybrid work, cloud adoption, and the proliferation of connected devices has dramatically expanded the attack surface. At the same time, threat actors are leveraging AI and automation to execute increasingly sophisticated attacks.

    In this new reality, implicit trust is a liability and should be countered with through verification. Organisations must embrace zero-trust as a foundational strategy to combat evolving threats. As attackers innovate, so too must defenders. Zero-trust’s dynamic and context-aware controls are uniquely positioned to outpace adversarial tactics. It is also essential to safeguard hybrid environments, where employees access resources from anywhere, meaning security must follow the user, not the network. Moreover, zero-trust improves resilience by reducing the impact area of successful attacks, ensuring that essential systems and date remain secure, while decreasing the time required for recovery efforts.

    Leading the charge: Priorities for SRM leaders

    For SRM leaders aiming to realise a successful zero trust strategy in 2025, the roadmap is clear. They should start by focusing their initial efforts on securing the most critical systems and data. This targeted approach delivers maximum impact while building momentum for broader adoption. Equally important is fostering a culture of security by educating stakeholders on the principles and benefits of zero-trust, emphasising collaboration across IT teams, business units, and executive leadership. Finally, investing in continuous improvement is crucial, as zero-trust is not a one-time initiative but a dynamic strategy that evolves in tandem with organisational changes. Regular assessments, iterative refinements, and leveraging advancements in technology are key to staying ahead of the curve.

    The road ahead

    As we move further into 2025, the stakes have never been higher.

    SRM leaders must act decisively, turning lessons from past attacks into catalysts for transformation. By prioritising zero-trust and aligning it with organisational goals, they can build defences that not only withstand the threats of today but anticipate the challenges of tomorrow. The future of zero trust starts now, and it starts with leadership.

    Gartner analysts will further explore the future of zero trust and cybersecurity priorities  at the Security & Risk Management Summit in London, 22-24 September, 2025.

    Dale Koeppen is a senior director analyst on Gartner’s Infrastructure Protection team.

    Read more on Network security management


    • Extending zero-trust principles to endpoints


    • Zero trust is a strategy, not a technology

      By: Aaron Tan


    • Decoding zero trust in endpoint security: A practical guide for CISOs

      By: Isla Sibanda


    • Security and risk management spending to grow 14% next year

      By: Alex Scroxton

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleRSAC rewind: Agentic AI, governance gaps and insider threats
    Next Article Signalgate is a signal to revisit security onboarding and training
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    6 billion leaked passwords reveal the ones you should never, ever use

    January 23, 2026

    A Lenovo update hints at Nvidia Arm CPUs coming soon

    January 23, 2026

    7 awesome Philips Hue smart light features you’re not using

    January 23, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025632 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025239 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025138 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Gadgets January 24, 2026

    The NexPhone is a working product that runs both Windows and Android

    The NexPhone is a working product that runs both Windows and Android If you have…

    Tesla Malaysia unleases Model 3 Standard RWD and Model Y Long Range RWD

    6 billion leaked passwords reveal the ones you should never, ever use

    A Lenovo update hints at Nvidia Arm CPUs coming soon

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    The NexPhone is a working product that runs both Windows and Android

    January 24, 20261 Views

    Tesla Malaysia unleases Model 3 Standard RWD and Model Y Long Range RWD

    January 24, 20260 Views

    6 billion leaked passwords reveal the ones you should never, ever use

    January 23, 20262 Views
    Most Popular

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.