Adoption of zero trust cybersecurity faces hurdles

IT systems based on zero trust network architecture have become necessary for securing an organisation's assets and data

You must be signed in to read this analysis

Sign in Sign up to our newsletter

In this article

  • IT supply chain
  • Fragmented conceptions
  • Multiple norms, little harmonisation
  • Systemic changes
  • Maturity phase
  • Adoption rates
  • Outlook

What is this?

This article is from the Oxford Analytica Daily Brief, which analyses geopolitical, economic, social, business and industrial developments on a global and regional basis, providing clients with timely, authoritative analysis every business day of the year. Find out more about the Oxford Analytica Daily Brief, or request a trial.