Part II - Responding Faster to Threats
Part II of this article will discuss mechanisms that can increase the speed with which responses to critical infrastructure threats can be executed.
So what are some specific options and what can be done to implement a faster, more aggressive response to such cyber threats? One security approach gaining momentum is to implement a “trust-less” process to secure critical data and assets. This approach makes the assumption that adversaries have already penetrated the network. Solutions . . .