IT disaster recovery, cloud computing and information security news

Zero trust: how to beat adversaries at their own game

ISACA has released a new resource, ‘Zero Trust: How to Beat Adversaries at Their Own Game’, that provides a primer complete with tactics for organizations developing a zero trust approach.

The document outlines the benefits of applying the zero trust principle and explores key considerations and components to include identity and access management, leveraging cloud technologies and device posture health checking.

The paper also walks through a brief history of exploitations and includes a listing of key compromises reported in the latter half of 2021 for context. Additionally, it delves into the tactics that hackers commonly use and how enterprises can apply zero trust technologies to interrupt a hacker’s tactical life cycle, such as:

  • Extending the control plane outside the enterprise
  • Using virtualization as a defensive solution
  • Planning to fail effectively
  • Employing intelligence to monitor insider threat activities

Obtain Zero Trust: How to Beat Adversaries at Their Own Game

Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.