Arguably though, it's his 'trust no-one' instinct that's kept him alive through 25 films.
And much like the omnipresent Spectre, global cyber crime continues to adapt and innovate with lethal effect. The recent spike in ransomware attacks over the past six months demonstrates cyber crime's increasing sophistication.
Thousands of new strands of zero-day malware are created every day, and signature-based protections which rely upon reactive catalogues of threats can't keep pace. Likewise, sandboxing files to diagnose them takes time and can fail to identify sophisticated malware that knows when it is being evaluated.
Without an up-to-date security framework in place, user credentials can be compromised and sensitive data can be stolen whether through internal negligence, such as an exposed AWS S3 bucket, or through malicious intent.
Cloud applications and bring-your-own-device (BYOD) can serve as proliferation points for malware when they are not properly secured. Unprotected personal devices can upload infected files to corporate SaaS applications, which can then spread malware to other devices and connected apps.
That's where Bond's 'trust no-one' approach comes in and why it's so important to implement a zero trust security model.
Unlike traditional approaches where an attacker can exploit cyber weaknesses upon gaining access inside a network segment perimeter, zero trust treats the identity of each user, application, device and data stream as its own independent 'perimeter,' allowing granular access policy enforcement.
As a result, rigorous security enforcement continues even if hackers compromise a corporate network — malware is blocked from traversing between user accounts, devices, applications and networks.
According to the 2021 Bitglass BYOD Security Report 41% of organisations rely on endpoint malware protection for BYOD, an approach that is not ideal for personal devices which are hard to control and manage.
Cloud-based malware protection tools are often a far better fit but are used far less often. Unfortunately, 30% of organisations don't protect against malware for BYOD at all.
Implementing advanced threat protection (ATP) as part of a zero trust SASE architecture is an important step in proactively blocking known and zero-day threats. Artificial intelligence, behaviour-based protections and integrating a choice of best-of-breed vendors such as Bitdefender or Cylance ensure fast and robust threat protection across all types of apps, devices, and infrastructure.
So when you're watching the newest Bond film No Time to Die, think about how different the world would be if we could finally defeat cyber crime – with advanced technology, and a little less trust.