Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Excuse me while I slip past your security - Richard Frost

      Excuse me while I slip past your security

      12 January 2026
      Apple tops global smartphone rankings in 2025

      Apple tops global smartphone rankings in 2025

      12 January 2026
      Eskom says SA power system strongest in five years

      Eskom says SA power system strongest in five years

      12 January 2026
      China is closing in on US tech lead despite constraints

      China is closing in on US tech lead despite constraints

      11 January 2026
    • World
      India seeks unprecedented access to smartphone software - Narendra Modi

      India seeks unprecedented access to smartphone software

      12 January 2026
      Samsung forecasts record operating profit as AI demand sends memory chip prices sharply higher worldwide - TM Roh

      Samsung cashes in on AI data centre boom as memory prices soar

      8 January 2026
      EU pressure mounts on Musk's X over AI 'undressing' images - Wolfram Weimer

      EU pressure mounts on Musk’s X over AI ‘undressing’ images

      7 January 2026
      Intel launches Panther Lake, its next-gen PC chip

      Intel launches Panther Lake, its next-gen PC chip

      6 January 2026
      Starlink plans to lower satellite orbit to enhance safety

      Starlink plans to lower satellite orbit to enhance safety

      4 January 2026
    • In-depth
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      DStv dodges channel blackout in last-minute deal with Warner Bros

      Canal+ plays hardball – and DStv viewers feel the pain

      3 December 2025
      Jensen Huang Nvidia

      So, will China really win the AI race?

      14 November 2025
    • TCS
      TCS+ | Africa's digital transformation - unlocking AI through cloud and culture - Cliff de Wit Accelera Digital Group

      TCS+ | Cloud without culture won’t deliver AI: Accelera’s Cliff de Wit

      12 December 2025
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
      TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

      TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

      6 November 2025
    • Opinion
      ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

      ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

      14 December 2025
      Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

      Netflix, Warner Bros deal raises fresh headaches for MultiChoice

      5 December 2025
      BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

      BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

      3 December 2025
      ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
      Zero Carbon Charge founder Joubert Roux

      The energy revolution South Africa can’t afford to miss

      20 November 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Embracing identity: a glimpse into the future of cybersecurity

    Embracing identity: a glimpse into the future of cybersecurity

    Promoted | Identity-centric zero trust is fast gaining traction in the security field, writes NEC XON's Michael de Neuilly Rice.
    By NEC XON17 January 2024
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    Michael de Neuilly Rice, cybersecurity architect at NEC XON

    In the fluid cybersecurity landscape, the focus has shifted from fortifying network perimeters to acknowledging the critical role of identity and user authentication. Threat actors no longer exploit vulnerabilities; they log in using legitimate credentials. This paradigm shift calls for innovative security approaches. One approach gaining prominence is identity-centric zero trust.

    The dark web and the accessibility of cybercrime

    The rise of a flourishing black market on the Dark Web has democratised cybercrime, making it accessible to a broader spectrum of individuals. Cybercrime-as-a-service organisations coupled with user-friendly tools have lowered the barrier of entry, allowing anyone with compromised identities to become a successful hacker.

    Zero-trust principles

    Microsoft’s “Evolving Zero Trust” white paper defines core principles for a successful zero-trust strategy:

    • Verify explicitly: Make security decisions using all available data points, including identity, location, device health, resource, data classification and anomalies.
    • Use least-privilege access: Limit access with just-in-time and just-enough-access (JIT/JEA) and risk-based adaptive policies.
    • Assume breach: Minimise blast radius with micro-segmentation, end-to-end encryption, continuous monitoring and automated threat detection and response.

    Identity-centric zero trust and ZTA

    Identity-centric zero trust builds upon zero-trust principles, making user identity the new perimeter. Strict controls and continuous authentication mechanisms ensure that only authorised entities gain access to sensitive resources.

    • Adaptive authentication – behavioural analysis: Implement advanced authentication methods that analyse user behaviour to detect anomalies, ensuring access is granted only to legitimate users.
    • Multi-factor authentication (MFA) – enhanced security layers: Integrate MFA protocols, focusing on passwordless and phishing-resistant methods like Windows Hello for Business and Fido2 keys. Extending MFA to all sections of the organisation is vital to sustain the identity-centric approach.
    • Policy-based access control – dynamic policies: Implement granular access control policies adapting based on contextual factors, such as user location, device health, compliance and time of access.
    • ITDR (identity threat detection and response): ITDR aims to reduce the time it takes to identify and respond to threats by combining information from all identity sources. Automated attack disruption stops identity attacks and lateral movement activities using compromised credentials, delivering consistent protection for human and non-human identities.

    The future of the modern perimeter

    As organisations embrace cloud-based services, remote work and diverse devices, the traditional network perimeter becomes obsolete. Identity-centric zero trust, fortified by zero-trust architecture, represents the future of cybersecurity. By placing identity at the forefront, organisations can adapt to the dynamic nature of modern business environments, proactively protecting assets and maintaining data integrity. In a digital landscape characterised by complexity and rapid evolution, identity-centric zero trust stands as a beacon guiding organisations towards a secure and adaptive future.

    • The author, Michael de Neuilly Rice, is cybersecurity architect at NEC XON
    • Read more articles by NEC XON on TechCentral
    • This promoted content was paid for by the party concerned


    Michael de Neuilly Rice NEC XON
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleAltman, Gates weigh AI risks in world’s big election year
    Next Article Union vows to fight jobs ‘slaughter’ at the Post Office

    Related Posts

    NEC XON brings high-performance wireless connectivity to Africa's remote industries - Willem Wentzel

    NEC XON’s new wireless stack keeps Africa’s remote industries online

    27 November 2025
    Mauritz Kotze, Cisco business unit lead at NEC XON

    NEC XON recognised as Cisco Gold Provider and Integrator

    11 November 2025
    Super Wi-Fi takes industrial connectivity beyond fibre and LTE limits - Willem Wentzel

    Super Wi-Fi takes industrial connectivity beyond fibre and LTE limits

    30 October 2025
    Company News
    Owning the right data is the new competitive moat in AI - CallMiner

    Owning the right data is the new competitive moat in AI

    9 January 2026
    Why trust is the real currency in modern media

    Why trust is the real currency in modern media

    6 January 2026
    Why banks and insurers need a single decisioning brain as pressures collide - SAS

    Why banks and insurers need a single decisioning brain as pressures collide

    29 December 2025
    Opinion
    ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

    ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

    14 December 2025
    Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

    Netflix, Warner Bros deal raises fresh headaches for MultiChoice

    5 December 2025
    BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

    BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

    3 December 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    The top-performing South African tech shares of 2025

    The top-performing South African tech shares of 2025

    12 January 2026
    Excuse me while I slip past your security - Richard Frost

    Excuse me while I slip past your security

    12 January 2026
    Apple tops global smartphone rankings in 2025

    Apple tops global smartphone rankings in 2025

    12 January 2026
    India seeks unprecedented access to smartphone software - Narendra Modi

    India seeks unprecedented access to smartphone software

    12 January 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}