Applying the Zero Trust Model to the World of File Transfer
Who are you? Are you allowed to be here? And, what are your intentions? – it’s an odd way to begin an interaction and seems rather counterproductive to all things human, but this model of “never trust, always verify” has overstayed the normal length of time for a buzz term giving it legitimacy.