{"id":14407,"date":"2025-08-04T15:20:40","date_gmt":"2025-08-04T15:20:40","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=14407"},"modified":"2025-08-04T15:20:40","modified_gmt":"2025-08-04T15:20:40","slug":"the-new-shape-of-zero-trust","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/","title":{"rendered":"The New Shape of Zero Trust"},"content":{"rendered":"<p>Data flows freely across networks, cloud apps, and AI tools \u2014 far beyond traditional perimeters. This infographic shows how organizations can apply core Zero Trust principles to protect assets wherever they live. Check it out to see how to continuously authenticate, enforce least-privileged access, and adapt with AI-powered insights. Contact Abrahams Consulting LLC for guidance on evolving your security model.<\/p>\n<p><a href=\"https:\/\/stuf.in\/bgu8lg\" target=\"_blank\">View: The New Shape of Zero Trust<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udcca Data is everywhere \u2014 in the cloud, on devices, inside AI models.<\/p>\n<p>Security teams need a new model that works where traditional defenses don&#8217;t. Check out this infographic from @Microsoft to see how a Zero Trust approach aligns identity, data, devices, and AI \u2014 giving you stronger, smarter protection from chip to cloud. #MSFTSecurity #Copilot<\/p>\n","protected":false},"author":2,"featured_media":14406,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,1136],"tags":[],"class_list":["post-14407","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The New Shape of Zero Trust - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The New Shape of Zero Trust - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"\ud83d\udcca Data is everywhere \u2014 in the cloud, on devices, inside AI models. Security teams need a new model that works where traditional defenses don&#039;t. Check out this infographic from @Microsoft to see how a Zero Trust approach aligns identity, data, devices, and AI \u2014 giving you stronger, smarter protection from chip to cloud. #MSFTSecurity #Copilot\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-04T15:20:40+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"The New Shape of Zero Trust\",\"datePublished\":\"2025-08-04T15:20:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/\"},\"wordCount\":72,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/08\/in_the_new_shape_of_zero_trust_thumb.jpg\",\"articleSection\":[\"Cloud\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/\",\"name\":\"The New Shape of Zero Trust - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/08\/in_the_new_shape_of_zero_trust_thumb.jpg\",\"datePublished\":\"2025-08-04T15:20:40+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/08\/in_the_new_shape_of_zero_trust_thumb.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/08\/in_the_new_shape_of_zero_trust_thumb.jpg\",\"width\":460,\"height\":560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The New Shape of Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The New Shape of Zero Trust - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"The New Shape of Zero Trust - TechTonic Times","og_description":"\ud83d\udcca Data is everywhere \u2014 in the cloud, on devices, inside AI models. Security teams need a new model that works where traditional defenses don't. Check out this infographic from @Microsoft to see how a Zero Trust approach aligns identity, data, devices, and AI \u2014 giving you stronger, smarter protection from chip to cloud. #MSFTSecurity #Copilot","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/","og_site_name":"TechTonic Times","article_published_time":"2025-08-04T15:20:40+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"The New Shape of Zero Trust","datePublished":"2025-08-04T15:20:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/"},"wordCount":72,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/08\/in_the_new_shape_of_zero_trust_thumb.jpg","articleSection":["Cloud","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/","name":"The New Shape of Zero Trust - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/08\/in_the_new_shape_of_zero_trust_thumb.jpg","datePublished":"2025-08-04T15:20:40+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/08\/in_the_new_shape_of_zero_trust_thumb.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/08\/in_the_new_shape_of_zero_trust_thumb.jpg","width":460,"height":560},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The New Shape of Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/14407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=14407"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/14407\/revisions"}],"predecessor-version":[{"id":14408,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/14407\/revisions\/14408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/14406"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=14407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=14407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=14407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}