{"title":"零信任和数据工程","authors":"Pankaj Gupta","doi":"10.1093/itnow/bwae030","DOIUrl":null,"url":null,"abstract":"\n Pankaj Gupta, a data analytics engineer from Discover Financial Services, puts zero trust under the microscope and explores why it's necessary, how it works and what the concept might mean for the future of security.","PeriodicalId":100735,"journal":{"name":"ITNOW","volume":"3 4","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Zero Trust and Data Engineering\",\"authors\":\"Pankaj Gupta\",\"doi\":\"10.1093/itnow/bwae030\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n Pankaj Gupta, a data analytics engineer from Discover Financial Services, puts zero trust under the microscope and explores why it's necessary, how it works and what the concept might mean for the future of security.\",\"PeriodicalId\":100735,\"journal\":{\"name\":\"ITNOW\",\"volume\":\"3 4\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-02-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ITNOW\",\"FirstCategoryId\":\"0\",\"ListUrlMain\":\"https://doi.org/10.1093/itnow/bwae030\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ITNOW","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.1093/itnow/bwae030","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Pankaj Gupta, a data analytics engineer from Discover Financial Services, puts zero trust under the microscope and explores why it's necessary, how it works and what the concept might mean for the future of security.