And so, our defense could not be playing attrition with such attacks. We need to switch to a different mindset. We call it, of course, zero-trust network configuration. That makes a different assumption. We would assume that the equipment, the systems, and so on, are probably already breached. And then, we need to live with that assumption and then just to contain its lateral movement.

Keyboard shortcuts

j previous speech k next speech