In a world where infrastructures are increasingly based on the Cloud, threats to one company often impact all companies . It is therefore important to quickly disseminate alerts and to capitalize on attack detection patterns to anticipate large-scale threats. Collective intelligence facilitates the sharing of this critical information.
Finally, in a society where data is generated faster than it can be analyzed by a human australia telegram data artificial intelligence can support companies in anticipating attacks, protecting themselves and securing the information systems of tomorrow.
New threats and changes in employee behavior justify rethinking the means of protection against cyber risks. Zero Trust is one of the good methods to address the problem.
However, perimeter security should not be abandoned in favor of a complete shift to Zero Trust. Many companies operate in hybrid mode and have not yet set foot in the cloud; some are even backing down for reasons of cost, availability and system security. Relying on a single solution increases the risk of Single Point Of Failure . VPNs and other proven methods can be retained and the establishment of a security perimeter around the network architecture must continue, especially at the level of critical resources. This remains valid as long as the entire infrastructure of the information system is not delegated to a Cloud player.
(*)Practice which consists of using one's personal computer equipment in a professional context