Emerging Technologies for Data Security in Zero Trust Environments
By Patrick Davis, Maj. Sean Coffey, Dr. Lubjana Beshaj, and Lt. Col. Nathaniel D. Bastian, Ph.D.
| July 30, 2024
Zero Trust (ZT), simply defined, is an information security framework which monitors and protects users, assets, resources, and data on a network by positively verifying all activity and never trusting anything by default. With the push to implement ZT across the public and private sectors, this transition between cybersecurity paradigms must be accomplished in a manner that is robust and enduring. This article examines emerging technologies most likely to impart the largest impact on ZT architectures (ZTAs), so that we better anticipate the pluses and minuses that will accompany those technologies. The discussion here focuses on data security, and the potential of each technology to affect security and protection across the lifecycle of data as it is generat¬ed, collected, transmitted, utilized, and stored. Technologies appraised include differ¬ential privacy, confidential computing, homomorphic encryption, quantum technolo¬gy, biological technology, blockchain, and alternative computing methods.
READ THE FULL ARTICLE HERE