Search

Your path to zero trust : practical steps to achieve a continuous zero trust model

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000nam a22000004b 4500</leader>
    <controlfield tag="001">MAP20210004087</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20210208133646.0</controlfield>
    <controlfield tag="008">160505e20201102usa||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">86</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20210002205</subfield>
      <subfield code="a">Izuakor, Christine </subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Your path to zero trust</subfield>
      <subfield code="b"> : practical steps to achieve a continuous zero trust model</subfield>
      <subfield code="c">Christine Izuakor</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">Austin, TX</subfield>
      <subfield code="b">Forcepoint</subfield>
      <subfield code="c">2020</subfield>
    </datafield>
    <datafield tag="300" ind1=" " ind2=" ">
      <subfield code="a">19 p.</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Zero Trust is more than a buzz phrase. It's a new paradigm way of implementing cybersecurity that has taken on new urgency as increasingly distributed organizations deal with a growing onslaught of complicated and sophisticated threats that result in data breaches. In a business world without perimeters, finding a balance between easy collaboration and data security can be challenging. The sudden increase in remote working has added layers of complexity, with users and data operating outside of traditional IT defenses that implicitly trust people who are inside of the network. </subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080622251</subfield>
      <subfield code="a">Seguridad de la información</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080592875</subfield>
      <subfield code="a">Protección de datos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080603731</subfield>
      <subfield code="a">Seguridad informática</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20210002212</subfield>
      <subfield code="a">Forcepoint</subfield>
    </datafield>
  </record>
</collection>