Mad Security
At long last, we have been presented with the Holy Grail of information security management and protection strategies. Forrester Research recently declared the Zero Trust Model (http://goo.gl/PT348) that aims to fix the current – broken – model in terms of inherent trust levels, which areas of the network should be protected and from which perspective. [...]