Post by account_disabled on Jan 12, 2024 23:22:43 GMT -6
To combat this threat, organizations spend significant amounts of money and manpower managing client devices, patching, and monitoring their networks. None of these activities directly add value, and every organization today is looking to reduce workload and its attendant costs. But with the advancement of technology, no organization today really needs a network. It needs service. And it can get them through the cloud without a network. About the Author Lieutenant Colonel is the Director of Faculty Development in the Department of Computer and Network Sciences at the United States Air Force Academy in Colorado Springs, Colorado. Prior to his current assignment.
Lieutenant Colonel Rozpage served as commander of the 1st Cyber Operations Squadron at Langley Air Force Base, Virginia. are those of the author and do not necessarily reflect the official policy or position of the U.S. Air Force, Department of Defense, or the U.S. Government. Tags: Cybersecurity Data Security Frontier Cyber and Cyber Resilience Believe in the efficacy of shortcuts in more decisions Email Lists Database like this The PR power of candor Add cybersecurity expertise to your board The case against limiting stock buybacks You must be logged in to post a comment. First time here? Sign up for a free account: comment on articles and access more articles. Comment by Renzo Cuadros This seems to be an article more about migrating applications to the cloud than actually implementing a zero trust model.
Also, the idea that you can move things to the cloud and ditch your network and security teams is incorrect and very dangerous. If you move everything to the cloud, you're still responsible for keeping your endpoints secure. Today, vulnerabilities originate from compromised endpoints. Also, the easiest way to get the good stuff is to bypass poor authentication and authorization controls (that's what you said at one point). When this problem is left to the end user to solve.
Lieutenant Colonel Rozpage served as commander of the 1st Cyber Operations Squadron at Langley Air Force Base, Virginia. are those of the author and do not necessarily reflect the official policy or position of the U.S. Air Force, Department of Defense, or the U.S. Government. Tags: Cybersecurity Data Security Frontier Cyber and Cyber Resilience Believe in the efficacy of shortcuts in more decisions Email Lists Database like this The PR power of candor Add cybersecurity expertise to your board The case against limiting stock buybacks You must be logged in to post a comment. First time here? Sign up for a free account: comment on articles and access more articles. Comment by Renzo Cuadros This seems to be an article more about migrating applications to the cloud than actually implementing a zero trust model.
Also, the idea that you can move things to the cloud and ditch your network and security teams is incorrect and very dangerous. If you move everything to the cloud, you're still responsible for keeping your endpoints secure. Today, vulnerabilities originate from compromised endpoints. Also, the easiest way to get the good stuff is to bypass poor authentication and authorization controls (that's what you said at one point). When this problem is left to the end user to solve.