Security architectures are rapidly changing to keep up with an ever evolving threat landscape. At RSA this year there will undoubtedly be a wide ranging set of opinions on what is the most effective architecture to secure your cloud, enterprise, or carrier network. One of the newest and most exciting techniques is called “zero-trust security.” The idea is to place security as close as possible to applications themselves and eliminate the idea of a trusted internal network and untrusted external networks. “Trust none. Verify all,” is the simple premise.