A brief history of zero trust
The cybersecurity game changer, from concept to cornerstone


Zero trust represents a revolution in how we protect data, connect people, and access tools. But how did we get here? What weaknesses in legacy network security helped the notion of a zero trust architecture rise to prominence?
This whitepaper looks at more than two decades of zero trust history—starting before it even had a name—to show you not just where it came from, but where it’s gone since. Read “A Brief History of Zero Trust” today to learn:
- How the rise of mobile devices made the world rethink the traditional perimeter
- When security started protecting users, data, and apps—not just the network
- Why three advanced principles put Zscaler’s zero trust a cut above the rest
Read the paper today.
Provided by Zscaler
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Cyber attacks against UK firms dropped by 10% last year, but experts say don't get complacent
News More than four-in-ten UK businesses were hit by a cyber attack last year, marking a decrease on the year prior – but security experts have warned enterprises to still remain vigilant.
By Emma Woollacott
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott
-
‘Insiders don’t need to break in’: A developer crippled company networks with malicious code and a ‘kill switch’ after being sacked – and experts warn it shows the huge danger of insider threats
News Security experts have warned ITPro over the risks of insider threats from disgruntled workers after a software developer deployed a 'kill switch' to sabotage his former employer’s networks.
By Ross Kelly
-
Zero trust gains momentum amid growing network visibility challenges
News Organizations are looking to automation, orchestration, and risk mitigation as key security priorities
By Emma Woollacott
-
So long, Defender VPN: Microsoft is scrapping the free-to-use privacy tool over low uptake
News Defender VPN, Microsoft's free virtual private network, is set for the scrapheap, so you might want to think about alternative services.
By Nicole Kobie
-
Developer security best practices in a fast growing tech company
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
By Emma Woollacott
-
Unlock profitability with Cove Data Protection
Whitepaper Agile risk management starts with a common language
By ITPro