Zero trust can reshape how businesses approach digital security. The idea is to distrust by default, regardless of whether the information is located inside or outside the corporate network. From there, security teams can verify devices, apps and connections on a case-by-case basis. They should also re-verify the trust of those network assets on an ongoing basis. That’s fine in theory, but it sure sounds like a lot of time and effort in practice. How can we make it easier?