Blog | G5 Cyber Security

Have we put too much emphasis on protecting the network?

We need to protect our entire IT system starting at the endpoint, mobile device, or IoT sensor. We have to focus our controls as close to the asset as possible and enforce access controls at the level of the asset or resource. The inventory of all of the devices, resources, applications, and policy enforcement points along the pathway should include hashed values of the software, and the software and firmware components are not changed without authorization, be that by a user, or by another process (a non-person entity NPE)

Source: https://www.helpnetsecurity.com/2021/02/15/protecting-the-network/

Exit mobile version