Cloud Security Trends: What Is Cybersecurity Mesh?


Have you heard of cybersecurity mesh? Some are calling it one of the more notable trends for cloud security and today’s other cyber concerns. So, what is it, and how does it work?


The technology stack is breaking down as more people use architectures based on microservices. They’re also using blockchain and other trust models to embrace an information-centric security model that works with distributed services (key to cloud security).


These changes, among others, mean more groups will consider adopting a new overall approach to security. Niel Harper, a chief information security officer, is well aware.


“The increase in remote access to on-premises data centers and cloud resources is driving the need for a flexible, composable architecture that integrates widely distributed and disparate security services,” he explained. “The goal would be to move perimeters encapsulating data centers to also creating perimeters around identities and objects that are not on-premises or on the same network — specifically, users accessing objects from anywhere, anytime and with a variety of device form factors. It also enables organizations to bring cloud services into their zero trust architecture and employ adaptive access control with more granular analyses of both subjects and objects.”


So, what does that mean in simpler terms? It comes down to the ‘mesh’ approach to cloud security. 


What Does Cybersecurity Mesh Mean for Cloud Security?


Support the originator by clicking the read the rest link below.