The ins and outs of zero-trust
Implementing zero-trust will depend on how you define it.
01 August 2025
Enterprises need effective access management policies, and, particularly for those with operations in different countries, should have eyes and ears everywhere, around the clock. This is easier said than done, as many firms have cobbled together different systems, which may have left gaps for attackers. There’s also the challenge of bringing heritage systems up to date. Representatives from iCrypto, the digital identity and access management platform, shone some light on what they’re seeing on the ground, at a recent roundtable co-hosted with Brainstorm.
Boitumelo Sathekge, GM, enterprise technology, Transnet, mentions that it had a cyber attack, the vector of which was its OT systems, and wonders how best to bridge the gap between the business and the IT department to secure the company.
ITWeb Premium
Get 3 months of unlimited access
No credit card. No obligation.