Zero Trust Explained | Cybersecurity Insights #17

preview_player
Показать описание

What is Zero Trust?
Imagine walking through an airport and having to validate your trustworthiness with every stride. That’s Zero Trust! It is a ‘verify all’ approach. Never trust; always verify every relationship – networks, devices, data, apps, and users – at every step.

Benefits of Zero Trust
Applying Zero Trust provides three main benefits: improved intelligence, faster containment, and better performance. Intelligence – understand your security posture. Containment – trap the threat to prevent it from advancing. Performance – through segmentation, there are fewer resources so system traffic does not get bogged down.

Asset intelligence is the foundation of Zero Trust; without knowledge of what you have, there’s no way to know what needs verifying. Get on the Zero Trust path and achieve persistent security.

----

Watch more episodes of the Cybersecurity Insights series:

----

Endpoint Risk Report

Рекомендации по теме
Комментарии
Автор

So the "name" Zero Trust was invented in 2010, but did you know the idea was invented in 2000? Go read the OSSTMM. Its in there. I wonder if John Kindervag came up with this idea on his own, or had some help, reading the OSSTMM? To be honest, everything in this video can be found in the OSSTMM. Which is again, 22 years old.

biohackingalchemy
join shbcf.ru