{"id":550992,"date":"2025-08-20T05:39:52","date_gmt":"2025-08-20T05:39:52","guid":{"rendered":"https:\/\/www.capgemini.com\/mx-es\/?p=550992&#038;preview=true&#038;preview_id=550992"},"modified":"2025-08-20T05:40:41","modified_gmt":"2025-08-20T05:40:41","slug":"zero-trust-and-users-cutting-through-the-noise","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/","title":{"rendered":"Zero trust and users: Cutting through the noise"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Zero trust and users: Cutting through the noise<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2022\/12\/lee-newcombe-e1525680343732-17-1.jpg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Lee Newcombe<\/h5><h5 class=\"blog-date\">Jun 12, 2025<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p>I\u2019ll admit \u2013 trying to explain zero trust without relying on the usual jargon and buzzwords is no small feat. But here goes.<\/p>\n\n\n\n<p>At its core, cybersecurity aims to ensure the right people have the right access to the right systems and data at the right time. Breaches tend to occur when any one of these elements goes wrong. Over the years, we\u2019ve leaned heavily on user identity and associated access controls \u2013 think usernames and passwords \u2013 but that approach has its flaws, both in effectiveness and in user experience. So, what have we learned over the years?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Organizations work in collaborative ecosystems<\/strong> \u2013 building metaphorical walls is ineffective due to the sheer number of holes you have to punch through them.<\/li>\n\n\n\n<li><strong>Users don\u2019t want to be confronted by security<\/strong>. They will work around your controls if they are too onerous. Transparent security is more effective.<\/li>\n\n\n\n<li><strong>Segmentation is important<\/strong>. Many ransomware attacks succeed because attackers, once inside, face minimal resistance in moving laterally across systems. Today\u2019s focus on operational resilience puts a spotlight on the need to reduce that blast radius.<\/li>\n<\/ul>\n\n\n\n<p>And this is where \u201czero trust\u201d comes in.<\/p>\n\n\n\n<p>You\u2019ll often hear \u201cnever trust, always verify\u201d when it comes to zero trust. It\u2019s not necessarily wrong, it\u2019s just not particularly helpful. The underlying philosophy is really \u201cassume compromise\u201d: start from the assumption that anything and everything in your IT ecosystem may be compromised; that could be the user themselves, their credentials, their laptop, the network they are using, or any combination of the above. How do you secure your systems and data if anything or everything is broken? Well, you start by building up trust, from that position of no trust whatsoever.<\/p>\n\n\n\n<p>How can I build up trust in the user\u2019s laptop? Is it one of ours? If so, can we give it a certificate it can use to identify itself? Is it configured in-line with our policy? Perhaps we can run a policy check. Has it been compromised? What does the endpoint security agent we have installed on the device say? From that position of untrusted, we\u2019ve now built up a degree of trust \u2013 assuming that the security tooling providing those checks is effective! (That trust thing again, eh?). What about the user? Well\u2026 have they presented the right credentials? Are they accessing from their usual location? At the usual times? In this case, we\u2019re now making decisions based on previous patterns of behavior, and this is where AI can help, particularly machine learning which can raise an alert and\/or deny access should behavior be seen as outside of normal baselines. We can score the trustworthiness of each and every access request, and grant access if a request is deemed sufficiently \u201cnormal.\u201d What about the network? Frankly, we don\u2019t really care, we\u2019re going to encrypt all the traffic and so the network is just a way of transporting data backwards and forwards. Just pick quantum-safe algorithms if your threat model demands it.<\/p>\n\n\n\n<p>One of the nice things about modern approaches to zero trust is that it connects the user to their applications rather than to the underlying network on which those applications are hosted. If you group the applications appropriately then you get that benefit of segmentation. An attacker may be able to compromise the application to which they have been given access, but they will then only be able to traverse to whatever other systems that application can see rather than having access to the full underlying (often flat) network. You can reduce the blast radius of a compromise.<\/p>\n\n\n\n<p>There are also some tangential, not security-specific benefits available. When you think about traditional ways of doing security, you\u2019ll likely find a fairly complex stack of security technologies in place within the data center. Wouldn\u2019t it be nice to be able to simplify that stack? Perhaps reduce the total cost of ownership in terms of overall license and support costs? All while still delivering the same security capabilities? That\u2019s where technologies like Zscaler can help. Centralize those security capabilities and deliver them from the cloud. This does, however, mean you are placing a <strong>LOT<\/strong> of trust in your \u201czero trust\u201d security services provider. An irony that is not lost on most security professionals, but another reason why I do grumble somewhat about the term.<\/p>\n\n\n\n<p>In summary, \u201czero trust\u201d is really just a way of delivering the dynamic, context-based security controls that modern business demands. You can choose the authentication credentials you want to use to provide the user experience you desire. Every access request is checked, such that if something goes wrong in the period between a user accessing Application A and asking to access Application B then you can deny the second request. You are only providing access to applications and not networks and so you reduce the risk of full network compromise. You can simplify your legacy security tooling and deliver much of this from the cloud, supplemented by other technologies (e.g. endpoint security) where it makes sense to do so.<\/p>\n\n\n\n<p>Businesses may not want \u201czero trust,\u201d but they probably will want the outcomes described above \u2013 improved user experience, reduced total cost of ownership, and improved operational resilience. Sometimes it\u2019s helpful to forget the buzzwords and focus on the outcomes. The final post in this series will talk about how we help our clients to do just this.<\/p>\n\n\n\n<p>In the next post, we will explore zero trust and devices \u2013 because yes, machines have identities too.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Know about the author<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2022\/12\/lee-newcombe-e1525680343732-17-1.jpg\" alt=\"Lee Newcombe\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"abrir en una nueva ventana\" href=\"https:\/\/www.linkedin.com\/in\/leenewcombe\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Lee Newcombe<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"abrir en una nueva ventana\" href=\"https:\/\/www.linkedin.com\/in\/leenewcombe\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>At its core, cybersecurity aims to ensure the right people have the right access to the right systems and data at the right time.<\/p>\n","protected":false},"author":266,"featured_media":550993,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[],"service":[],"industry":[],"partners":[],"blog-topic":[48],"content-group":[],"class_list":["post-550992","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","blog-topic-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero trust and users: Cutting through the noise - Capgemini Mexico<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero trust and users: Cutting through the noise\" \/>\n<meta property=\"og:description\" content=\"At its core, cybersecurity aims to ensure the right people have the right access to the right systems and data at the right time.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Mexico\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-20T05:39:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-20T05:40:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/10\/New-Web-preview-global.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lee Newcombe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"priyankahitarthtanna\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/\"},\"author\":{\"name\":\"priyankahitarthtanna\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/person\/79833dfc67169023071e7f5217558001\"},\"headline\":\"Zero trust and users: Cutting through the noise\",\"datePublished\":\"2025-08-20T05:39:52+00:00\",\"dateModified\":\"2025-08-20T05:40:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/\"},\"wordCount\":946,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg\",\"inLanguage\":\"es-MX\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/\",\"url\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/\",\"name\":\"Zero trust and users: Cutting through the noise - Capgemini Mexico\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg\",\"datePublished\":\"2025-08-20T05:39:52+00:00\",\"dateModified\":\"2025-08-20T05:40:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#breadcrumb\"},\"inLanguage\":\"es-MX\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-MX\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg\",\"width\":2881,\"height\":1801},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/mx-es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero trust and users: Cutting through the noise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#website\",\"url\":\"https:\/\/www.capgemini.com\/mx-es\/\",\"name\":\"Capgemini Mexico\",\"description\":\"Capgemini\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/mx-es\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es-MX\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#organization\",\"name\":\"Capgemini Mexico\",\"url\":\"https:\/\/www.capgemini.com\/mx-es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-MX\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/07\/linkedin_mwo0q6.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/07\/linkedin_mwo0q6.png\",\"width\":800,\"height\":800,\"caption\":\"Capgemini Mexico\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/person\/79833dfc67169023071e7f5217558001\",\"name\":\"priyankahitarthtanna\",\"url\":\"https:\/\/www.capgemini.com\/mx-es\/author\/priyankahitarthtanna\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero trust and users: Cutting through the noise - Capgemini Mexico","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/","og_locale":"es_MX","og_type":"article","og_title":"Zero trust and users: Cutting through the noise","og_description":"At its core, cybersecurity aims to ensure the right people have the right access to the right systems and data at the right time.","og_url":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/","og_site_name":"Capgemini Mexico","article_published_time":"2025-08-20T05:39:52+00:00","article_modified_time":"2025-08-20T05:40:41+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/10\/New-Web-preview-global.jpg","type":"image\/jpeg"}],"author":"Lee Newcombe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"priyankahitarthtanna","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/"},"author":{"name":"priyankahitarthtanna","@id":"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/person\/79833dfc67169023071e7f5217558001"},"headline":"Zero trust and users: Cutting through the noise","datePublished":"2025-08-20T05:39:52+00:00","dateModified":"2025-08-20T05:40:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/"},"wordCount":946,"publisher":{"@id":"https:\/\/www.capgemini.com\/mx-es\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg","inLanguage":"es-MX"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/","url":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/","name":"Zero trust and users: Cutting through the noise - Capgemini Mexico","isPartOf":{"@id":"https:\/\/www.capgemini.com\/mx-es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg","datePublished":"2025-08-20T05:39:52+00:00","dateModified":"2025-08-20T05:40:41+00:00","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#breadcrumb"},"inLanguage":"es-MX","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/"]}]},{"@type":"ImageObject","inLanguage":"es-MX","@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#primaryimage","url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg","contentUrl":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg","width":2881,"height":1801},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/mx-es\/"},{"@type":"ListItem","position":2,"name":"Zero trust and users: Cutting through the noise"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/mx-es\/#website","url":"https:\/\/www.capgemini.com\/mx-es\/","name":"Capgemini Mexico","description":"Capgemini","publisher":{"@id":"https:\/\/www.capgemini.com\/mx-es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/mx-es\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es-MX"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/mx-es\/#organization","name":"Capgemini Mexico","url":"https:\/\/www.capgemini.com\/mx-es\/","logo":{"@type":"ImageObject","inLanguage":"es-MX","@id":"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/07\/linkedin_mwo0q6.png","contentUrl":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/07\/linkedin_mwo0q6.png","width":800,"height":800,"caption":"Capgemini Mexico"},"image":{"@id":"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/person\/79833dfc67169023071e7f5217558001","name":"priyankahitarthtanna","url":"https:\/\/www.capgemini.com\/mx-es\/author\/priyankahitarthtanna\/"}]}},"blog_topic_info":[{"id":48,"name":"Cybersecurity"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"blog-topic":[{"id":48,"name":"Cybersecurity","slug":"cybersecurity"}],"following_users":[{"id":520,"name":"priyankahitarthtanna","slug":"priyankahitarthtanna"},{"id":224,"name":"vikramjanugade","slug":"vikramjanugade"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Zero trust and users: Cutting through the noise","url":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Mexico","logo":""},"keywords":[],"dateCreated":"2025-08-20T05:39:52Z","datePublished":"2025-08-20T05:39:52Z","dateModified":"2025-08-20T05:40:41Z"},"rendered":"<meta name=\"parsely-title\" content=\"Zero trust and users: Cutting through the noise\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/zero-trust-and-users-cutting-through-the-noise\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2025-08-20T05:39:52Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Mexico","distributor_original_site_url":"https:\/\/www.capgemini.com\/mx-es","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Zero-trust-web-banner-2025.jpg","author_title":"Lee Newcombe","author_thumbnail_url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2022\/12\/lee-newcombe-e1525680343732-17-1.jpg?w=555","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/posts\/550992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/users\/266"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/comments?post=550992"}],"version-history":[{"count":1,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/posts\/550992\/revisions"}],"predecessor-version":[{"id":550995,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/posts\/550992\/revisions\/550995"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/media\/550993"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/media?parent=550992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/categories?post=550992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/tags?post=550992"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/brand?post=550992"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/service?post=550992"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/industry?post=550992"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/partners?post=550992"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/blog-topic?post=550992"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/content-group?post=550992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}