{"id":297,"date":"2024-05-14T16:16:53","date_gmt":"2024-05-14T16:16:53","guid":{"rendered":"http:\/\/cybernetics.partners\/?p=297"},"modified":"2024-05-14T16:33:49","modified_gmt":"2024-05-14T16:33:49","slug":"assume-breach-a-network-security-engineer-perspective","status":"publish","type":"post","link":"https:\/\/cybernetics.partners\/?p=297","title":{"rendered":"Assume Breach. A Network Security Engineer Perspective"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybernetics.partners\/wp-content\/uploads\/2024\/05\/3Com-FDDI-Switches-1995.pdf.jpg\" alt=\"\" class=\"wp-image-301\" width=\"369\" height=\"376\" srcset=\"https:\/\/cybernetics.partners\/wp-content\/uploads\/2024\/05\/3Com-FDDI-Switches-1995.pdf.jpg 740w, https:\/\/cybernetics.partners\/wp-content\/uploads\/2024\/05\/3Com-FDDI-Switches-1995.pdf-294x300.jpg 294w\" sizes=\"auto, (max-width: 369px) 100vw, 369px\" \/><figcaption><em><sub>When networks were simple (Photo courtesy of the Author)<\/sub><\/em><\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-left\">Sophisticated attackers (sometimes &#8220;not so&#8221;) are bypassing protection layers and then avoiding detection tools. An &#8220;Assume Breach&#8221; mindset needs to be adopted and embraced.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">In the published deck (Download Link Below), I will try to present in a simple way and from a Network Security Engineer perspective, the Rubrics of the &#8220;Assume Breach&#8221; mindset along with the building blocks of the &#8220;Zero Trust Micro Segmentation&#8221; technology that supports it.<\/p>\n\n\n\n<div class=\"wp-block-file\"><a href=\"https:\/\/cybernetics.partners\/wp-content\/uploads\/2024\/05\/Assume-Breach-A-Network-Security-Engineer-Perspective-Rabih-Itani-May-2024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Assume-Breach-A-Network-Security-Engineer-Perspective-Rabih-Itani-May-2024<\/a><a href=\"https:\/\/cybernetics.partners\/wp-content\/uploads\/2024\/05\/Assume-Breach-A-Network-Security-Engineer-Perspective-Rabih-Itani-May-2024.pdf\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sophisticated attackers (sometimes &#8220;not so&#8221;) are bypassing protection layers and then avoiding detection tools. An &#8220;Assume Breach&#8221; mindset needs to be adopted and embraced. In the published deck (Download Link Below), I will try to present in a simple way and from a Network Security Engineer perspective, the Rubrics of the &#8220;Assume Breach&#8221; mindset along [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":308,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[45,15,47,37,46],"class_list":["post-297","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-slide-deck","tag-assumebreach","tag-cybersecurity","tag-killchain","tag-microsegmentation","tag-zerotrust"],"_links":{"self":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=297"}],"version-history":[{"count":6,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/297\/revisions\/306"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/media\/308"}],"wp:attachment":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}