The CISO Guide to Zero Trust Security
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
聴き放題対象外タイトルです。Audible会員登録で、非会員価格の30%OFFで購入できます。
-
ナレーター:
-
Michelle Badhwar
-
著者:
-
Raj Badhwar
このコンテンツについて
The Zero Trust Security framework provides essential security controls to remediate and mitigate advanced cyber threats from compromising our applications and systems. The leaders of our nation, and the business and technology leaders of our firms, have put in a call to arms for CISOs and other security professionals to lead this effort to secure our systems and applications from cyber-attackers. I have answered their call by writing this book. This book provides guidance on implementing Zero Trust-based security controls augmented with least privileged access and continuous authentication paradigms, essential to organizational information security for the traditional security domains such as network, data, device, application, identity, email, user and cloud, as well as the newer domains of API, AI, IoT, and third-party systems (like SaaS).
©2022 Raj Badhwar (P)2022 Raj Badhwar