From 316dcb18f265419b50aac15fccfcd62e797ea034 Mon Sep 17 00:00:00 2001 From: Bruce Davie <3101026+drbruced12@users.noreply.github.com> Date: Fri, 14 Jun 2024 15:53:38 +1000 Subject: [PATCH] typos --- security/trend.rst | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/security/trend.rst b/security/trend.rst index 2a823cc..01a3e87 100644 --- a/security/trend.rst +++ b/security/trend.rst @@ -82,17 +82,17 @@ new tool to make a finer degree of isolation much easier to manage. A set of virtual machines communicate through a firewall The development of microsegmentation over the last decade was one of -the major drives of SDN adoption in the enterprise. It became the +the major drivers of SDN adoption in the enterprise. It became the basis for a best practice in security known as “zero-trust” networking. Zero trust means that, as much as possible, every system in the network is assumed to be untrusted, and hence should be isolated -for all other systems aside from precisely those systems it needs +from all other systems aside from precisely those systems it needs access to in order to do its assigned job. The importance of the Internet in the running of critical systems and as the underpinning for much of the world's commerce has made it an attractive target for -hackers. At the same time it drives home the importance of developing and adopting +hackers. At the same time it drives home the need to develop and adopt best practices such as zero-trust networking. When we read of breaches today, it is often the case that some best practice has not been followed. The Verizon cybersecurity report, by documenting what has