Hacker News new | past | comments | ask | show | jobs | submit login

Exactly. Only thing you can do is make a drill where you assume everything is hacked and audit access daily, weekly and monthly.



Implementing a zero-trust architecture with a trust-score system for users and a dynamic policy for accessing resources can help to limit potential damage in the event of a security incident. But I agree that the balance between protecting against attacks and maintaining productivity can be delicate.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: