Enhancing Zero Trust Security with AI

Vlad Yashin
Axioma AI Journal
Published in
6 min readApr 15, 2024

--

Long-form story about how AI helps fight hackers, fraudsters & data thieves.

Photo by Miłosz Klinowski on Unsplash

First of all, before we start enhancing and optimizing the Zero Trust model, let’s briefly recall what it actually is.

What is Zero Trust?

Zero Trust is a security model that operates on the principle:

Never trust, always verify.

The Zero Trust security model was first created by John Kindervag in 2010 while he was a principal analyst at Forrester Research.

John Kindervag. Source: BankInfoSecurity
  • Mobile access
  • IoT devices
  • Cloud computing

Those three core fields are the main catalysators that pushed and blurred the boundaries of the traditional networks, extending it to a whole new level.

Core problem: Traditional security models before 2010 relied heavily on securing the perimeter of the network.

However the threats increasingly originated not only from outside, but also from within the network or bypassed these network perimeters entirely.

--

--

Vlad Yashin
Axioma AI Journal

Data Scientist • AI Engineer • Ex-Host of The Futurisity Podcast • www.iamvladyashin.com