Micro-segmentation combined with zero-trust access control between the segments is recommended as one of the best approaches to breach containment. This principle is now extended from the network infrastructure to the endpoint, whether that device is local in the office, portable, or remote at home.
from SecurityWeek RSS Feed https://ift.tt/3erYJwL
via https://ifttt.com/ IFTTT
No comments:
Post a Comment