{"title":"Why zero trust should start at the endpoint","authors":"Henry b. Harrison","doi":"10.12968/s1353-4858(23)70032-9","DOIUrl":null,"url":null,"abstract":"The zero-trust concept is rapidly growing in popularity, particularly with the rise of hybrid working practices and the continued erosion of the traditional network perimeter. But where do you start when implementing a zero-trust strategy?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"58 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(23)70032-9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The zero-trust concept is rapidly growing in popularity, particularly with the rise of hybrid working practices and the continued erosion of the traditional network perimeter. But where do you start when implementing a zero-trust strategy?