Remove cyber-risk security-considerations-in-a-byod-culture
article thumbnail

The Road to Zero Trust

Thales Cloud Protection & Licensing

But behind the scenes, this emergence of often untrusted devices (BYOD) and an increased adoption of unsanctioned applications (a trend called “Shadow IT”) has led to security nightmares for IT departments. The path to a Zero Trust posture is not linear, and the tall claims by security vendors often cloud the decision-making.

Risk 77