Thoughts on the Spectre of Zero Trust
Blog: Forrester BPM Center of Excellence
The threat model has changed. Data breaches have traditionally required execution of some manner of code on a system to access data and a network connection to exfiltrate the data off the system. This is no longer the case as Spectre reduces the requirement for code execution to anywhere on a device, as opposed […]
Leave a Comment
You must be logged in to post a comment.