{"title":"为什么零信任应该从端点开始","authors":"Henry b. Harrison","doi":"10.12968/s1353-4858(23)70032-9","DOIUrl":null,"url":null,"abstract":"The zero-trust concept is rapidly growing in popularity, particularly with the rise of hybrid working practices and the continued erosion of the traditional network perimeter. But where do you start when implementing a zero-trust strategy?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"58 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Why zero trust should start at the endpoint\",\"authors\":\"Henry b. Harrison\",\"doi\":\"10.12968/s1353-4858(23)70032-9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The zero-trust concept is rapidly growing in popularity, particularly with the rise of hybrid working practices and the continued erosion of the traditional network perimeter. But where do you start when implementing a zero-trust strategy?\",\"PeriodicalId\":100949,\"journal\":{\"name\":\"Network Security\",\"volume\":\"58 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Network Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1353-4858(23)70032-9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(23)70032-9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The zero-trust concept is rapidly growing in popularity, particularly with the rise of hybrid working practices and the continued erosion of the traditional network perimeter. But where do you start when implementing a zero-trust strategy?