GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

The Other Side of Zero Trust

The federal government has been taking zero trust more seriously. Although a significant part of it has yet to be implemented, some initial work has been completed with zero trust network access, yet the outside-in approach to zero trust and complexity remains. But the more important aspect of zero trust relates to application and workload connections, which is what attackers care about and is not being protected today.

This “other side” of zero trust and a host-based micro-segmentation approach will lead to greater security and will stop the lateral movement of malware.

 

Interested in cybersecurity? Check out this GovWhitePapers blog post! You can also find events on cybersecurity on our sister site, GovEvents.

 

  • Author(s):
  • Mark Sincevich
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
The Other Side of Zero Trust
Format:
  • Case Study
Topics:
Website:Visit Publisher Website
Publisher:AFCEA International
Published:January 31, 2021
License:Copyrighted
Copyright:© 2021 AFCEA International

Featured Content

Contact Publisher

Claim Content