The federal government has been taking zero trust more seriously. Although a significant part of it has yet to be implemented, some initial work has been completed with zero trust network access, yet the outside-in approach to zero trust and complexity remains. But the more important aspect of zero trust relates to application and workload connections, which is what attackers care about and is not being protected today.
This “other side” of zero trust and a host-based micro-segmentation approach will lead to greater security and will stop the lateral movement of malware.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | AFCEA International |
Published: | January 31, 2021 |
License: | Copyrighted |
Copyright: | © 2021 AFCEA International |