Hero Panel Image

EDITOR'S PICK

Engaging the adversary with cloud-enabled active defense

Share:
Pam Kubiatowski

Pam Kubiatowski

Contributor

Zscaler

Lisa Lorenzin

Lisa Lorenzin

Contributor

Zscaler

Dec 21, 2021

By baking fake attack surfaces into the architecture of zero trust, you can supercharge security frameworks with protection, detection, and response.

If your malware problem is eclipsed by your adversary problem it’s time for active defense. In this episode, guest Sahir Hidayatullah, VP, Active Defense at Zscaler, covers the latest strategies for marrying zero trust with active defense and how the Zscaler Zero Trust Exchange helps make it seamless.

Listeners get a brief history of the origins of honeypots and intrusion deception, and a compelling case for baking fake attack surfaces into the architecture of zero trust to help supercharge security frameworks with protection, detection, and response.

Listen now:

Listen on Spotify Apple | Google

WHAT IS CLOUDY WITH A CHANCE OF TRUST?

A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation.

 

Recommended