Dr. Philip Cao

Stay Hungry. Stay Foolish.

Extending Zero Trust to the Endpoint

1 min read

Palo-Alto-Networks-Logo-with-Tagline

With exploit kits readily available to attackers, even ‘good’ applications can go ‘bad.’ Many endpoint security approaches begin by trusting everything, and monitoring for patterns or malicious behaviors, while others attempt to whitelist trusted applications and block the rest. The “Zero Trust model” of information security, coined by Forrester, has traditionally been applied to network communications, but today’s advanced cyber threats warrant a new approach in which the Zero Trust model is extended to endpoints; on the OS, on connected devices, and in memory.

This is particularly important as most resources an attacker might be interested in – data and applications – will live on the endpoint. This webinar, hosted by Sebastian Goodwin, examines how an organization can, and why they should, extend a “never trust, always verify” philosophy to their endpoint security.

[Palo Alto Networks Blog]

Leave a Reply

Copyright © 2006-2024 Dr. Philip Cao. All rights reserved

Discover more from Dr. Philip Cao

Subscribe now to keep reading and get access to the full archive.

Continue reading