Get a Pentest and security assessment of your IT network.

Cyber Security

Can zero trust kill our need to talk about locations?

The 2020 Data Breach Investigations Report (DBIR) showed that over 80% of hacking-related breaches involved the use of lost or stolen credentials. The more modern approach is ‘governance-driven’ which is implemented at the application network layer (i.e., Layer 7), with the most common deployment model being the agent / gateway. This provides more security, with role-based access being the norm and lateral movement being much more difficult if criminals gained access. Use the cyber chain of failure to interrupt the attackers.

Source: https://www.helpnetsecurity.com/2021/05/24/location-agnostic-access-zero-trust/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security