March 2024
Intermediate to advanced
400 pages
12h 26m
English
Zero Trust is not a new approach to security, but it does need a bolder mindset to tackle. If you survey the entire enterprise landscape, you will find that there are deployments and architectures with various maturities. Some of them are designed with complex threat modeling. Others have simple dot1x to provide network access. These deployments are polar opposites of each other, but what they have in common is static rule-based access control. Zero Trust essentially shifts the focus from this common aspect of all security mechanisms. It can be identified as an amalgamation of most security concepts we already know. An enterprise with an established security portfolio may find the adoption of Zero Trust ...
Read now
Unlock full access