Organisations can uphold zero trust security benefits for noncompliant infrastructure through two methods. First, by isolating such systems within a segmented network to control access, and second, adopting a strategy employing proxy-based approach to mediate traffic and enforce policies to these parts.

Dispersed responsibility, lack of asset inventory is causing gaps in medical device cybersecurity
Witnesses at a House hearing on medical device cybersecurity highlighted the need for better tracking of devices and their vulnerability to cyber threats. They noted