Tag: Zero-Trust Architecture

  • Cybersecurity: Functions (Part 4)

    Protect. This function, protection, is perhaps the most common function associated with cybersecurity. When speaking about the CIA triad, the day-to-day functions, and the purposes of cybersecurity, the first function most people think about is the protection of identities, data, and assets. As we’ve seen in the previous posts about cybersecurity functions, there are many…

  • Cybersecurity: Functions (Part 3)

    Under NIST, to know the organization, its risk profile, threats, vulnerabilities, priorities, requirements, and capabilities, we use the function Identify.