{"id":15554,"date":"2025-11-24T22:30:51","date_gmt":"2025-11-24T22:30:51","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=15554"},"modified":"2025-11-24T22:30:51","modified_gmt":"2025-11-24T22:30:51","slug":"the-new-shape-of-zero-trust-3","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/","title":{"rendered":"The New Shape of Zero Trust"},"content":{"rendered":"<p>With data, users, and devices spread across hybrid and cloud environments, securing access requires a modern approach. The infographic, &#8220;The New Shape of Zero Trust,&#8221; illustrates Microsoft&#8217;s AI-enhanced Zero Trust architecture. It is one that continuously verifies identity, protects data everywhere, and simplifies control across networks, endpoints, and apps. View this infographic to see how Zero Trust adapts to the AI era. Then, contact Abrahams Consulting LLC to discuss how Microsoft solutions can strengthen your Zero Trust foundation.<\/p>\n<p><a href=\"https:\/\/stuf.in\/bhjywu\" target=\"_blank\">View: The New Shape of Zero Trust<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber threats are escalating, and traditional perimeter defenses can&#8217;t keep up. To secure today&#8217;s boundaryless environments, security leaders like you are turning to a Zero Trust approach. \ud83d\udee1\ufe0f<\/p>\n<p>Microsoft&#8217;s infographic, &#8220;The New Shape of Zero Trust,&#8221; shows how continuous verification, least-privilege access, and AI-powered protection combine to safeguard every identity and device.<\/p>\n<p>Review this infographic to see how Zero Trust architecture evolves for the AI age.  @Microsoft Security<\/p>\n","protected":false},"author":2,"featured_media":15553,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,1139,1136],"tags":[],"class_list":["post-15554","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-microsoft","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The New Shape of Zero Trust - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The New Shape of Zero Trust - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Cyber threats are escalating, and traditional perimeter defenses can&#039;t keep up. To secure today&#039;s boundaryless environments, security leaders like you are turning to a Zero Trust approach. \ud83d\udee1\ufe0f Microsoft&#039;s infographic, &quot;The New Shape of Zero Trust,&quot; shows how continuous verification, least-privilege access, and AI-powered protection combine to safeguard every identity and device. Review this infographic to see how Zero Trust architecture evolves for the AI age. @Microsoft Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-24T22:30:51+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"The New Shape of Zero Trust\",\"datePublished\":\"2025-11-24T22:30:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/\"},\"wordCount\":92,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/11\/in_the_new_shape_of_zero_trust_1_thumb.jpg\",\"articleSection\":[\"Cloud\",\"Microsoft\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/\",\"name\":\"The New Shape of Zero Trust - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/11\/in_the_new_shape_of_zero_trust_1_thumb.jpg\",\"datePublished\":\"2025-11-24T22:30:51+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/11\/in_the_new_shape_of_zero_trust_1_thumb.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/11\/in_the_new_shape_of_zero_trust_1_thumb.jpg\",\"width\":460,\"height\":560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The New Shape of Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The New Shape of Zero Trust - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/","og_locale":"en_US","og_type":"article","og_title":"The New Shape of Zero Trust - TechTonic Times","og_description":"Cyber threats are escalating, and traditional perimeter defenses can't keep up. To secure today's boundaryless environments, security leaders like you are turning to a Zero Trust approach. \ud83d\udee1\ufe0f Microsoft's infographic, \"The New Shape of Zero Trust,\" shows how continuous verification, least-privilege access, and AI-powered protection combine to safeguard every identity and device. Review this infographic to see how Zero Trust architecture evolves for the AI age. @Microsoft Security","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/","og_site_name":"TechTonic Times","article_published_time":"2025-11-24T22:30:51+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"The New Shape of Zero Trust","datePublished":"2025-11-24T22:30:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/"},"wordCount":92,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/11\/in_the_new_shape_of_zero_trust_1_thumb.jpg","articleSection":["Cloud","Microsoft","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/","name":"The New Shape of Zero Trust - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/11\/in_the_new_shape_of_zero_trust_1_thumb.jpg","datePublished":"2025-11-24T22:30:51+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/11\/in_the_new_shape_of_zero_trust_1_thumb.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/11\/in_the_new_shape_of_zero_trust_1_thumb.jpg","width":460,"height":560},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-new-shape-of-zero-trust-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The New Shape of Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/15554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=15554"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/15554\/revisions"}],"predecessor-version":[{"id":15555,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/15554\/revisions\/15555"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/15553"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=15554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=15554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=15554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}