Chapter 2. Security Must Evolve
After understanding most of the critical aspects of threat landscape, it's time to change the way we look at cybersecurity. The endless variety of malware family has got the capability of being persistent, hidden, self-destructive and can bypass traditional security systems by behaving like a legitimate user, making the defenders to adapt a new security approach to achieve a better cyber posture. In this chapter, we will understand the different approaches adapted by defenders to combat advanced threats and to strengthen cyber security systems.
This chapter will introduce some of the most widely used security practices deployed starting from network perimeter to server farm. This chapter will also explore insight on the zero-trust security approach and the breach-acceptance security approach.
In this chapter, you will learn about the following topics:
- The security ecosystem
- The zero-trust approach
- The assume breach approach
- Evolution at the foundation layer