ZTNA: what is it and how does it encourage information security specialists to put themselves in the place of hackers?

How can information security specialists reduce the number of possible weaknesses and the attack surface? One possible solution is to apply a zero–trust model to the weakest point of the network – unprotected access points that are easy to hack. If you are not familiar with the concept of a network access with “zero trust” […]

Read More