Sertan Selcuk, VP for METAP & CIS, OPSWAT, has provided his 10 cybersecurity trends that the critical infrastructure sector should …
Introducing content disarm and reconstruction – the zero-trust rebel that frisks every file
Instead, let us consider technology that does not rely on detection but follows zero-trust principles and assumes all files are malicious. This method works by first verifying a file’s type and identifying any embedded content. It removes any content it considers to be potentially malicious and reconstructs the file using only legitimate components. We call this sanitisation method “content disarm and reconstruction”, or CDR.