Better companies
Fail fast, fail often
Cybersecurity, in the Plural
As passwordless authentication emerges as one of the next big shifts in cybersecurity, the story of multi-factor authentication (M…
Wednesday, 1 October 2025
article
Traditionally, IT security has operated with a perimeter-based logic, comparable to a fortress: the firewall serves as the outer wall, and once “inside,” users are implicitly trusted and free to roam throughout the network.
Zero Trust - literally “trust zero,” never trust by default, always verify - flips this logic on its head. Every access, every resource, and every action is checked, even within the network. It’s like placing a guard at every door of the castle.
This approach is built on four founding principles:
In the 1990s, several researchers and security practitioners began questioning implicit trust inside the network. In 2004, the Jericho Forum introduced the concept of “de-perimeterization,” anticipating a world where cloud and mobility would blur the boundaries between organizations and the outside.
In 2009, Google launched the BeyondCorp project (published in 2014), implementing a “perimeterless” architecture. The following year, John Kindervag, an analyst at Forrester Research, formalized Zero Trust, giving it a clear framework and helping spread the concept.
Today, Zero Trust has been taken up by major corporations and recommended by government agencies such as NIST in the United States, ANSSI in France, and NCSC in the United Kingdom.
According to Gartner, 63 % of companies and organizations worldwide have already implemented a Zero Trust strategy. However, in most cases, this strategy only covers part of the infrastructure.
That’s because Zero Trust is not an out-of-the-box tool you simply install - it’s a rigorous security posture that is complex to implement.
It requires modernizing outdated infrastructures, deploying and integrating multiple advanced solutions into existing systems, and training employees in new practices.
The necessary investments may sometimes seem disproportionate compared to still underestimated threat. In addition, some executives resist having their own access privileges restricted.
But things are changing. Increasing regulatory pressure is imposing stricter standards for data protection. At the same time, the growing maturity of solutions - more integrated, automated, and compatible with existing environments - is making Zero Trust more accessible.
As a result, the adoption of Zero Trust is clearly underway. For many companies, the question is no longer “Should we implement this principle?” but rather “How quickly can we get there?”