network segmentation

network segmentation

Sep 152017

Keeping Them Out of Your Vault: Network Segmentation in the Cloud

When does a breach become lethal? Is it the initial compromise, possibly due to unpatched vulnerabilities? Or, is it the exfiltration of valuable data – when a compromise becomes a breach and potentially a headline in the news cycle? Semantics aside, there’s another, often ignored aspect in the evolution from compromise to breach, one with […]