Ericom ZTEdge Named "Outperformer" on GigaOM Radar – Click Here! Learn How Web Application Isolation Secures 3rd Party/Unmanaged Devices – Click Here! Ericom Software and ZTEdge Win 5 Global InfoSec Awards – Click Here!

Insights and Ideas from Dr. Zero Trust

Dr. Chase Cunningham, Ericom Software Chief Strategy Officer and a leading cybersecurity expert and originator of Forrester’s ZTX Zero Trust Extended Framework, shares the latest cybersecurity and Zero Trust news that executives need to know.

 

Read Chase’s weekly summary and hand-picked articles below!
Enter your email address to get weekly insights and articles delivered to your inbox.



Weekly Summary (8/8/2022): The movement marches onward, and wow, are there dollars to back that assertion up. The report this week on the growth of the ZT specific market is staggering. I don’t recall seeing numbers like these on a security market sector anytime in my memory. The ZT market is estimated to have about a 17 percent CAGR in the next 6 years and hit roughly $70 billion globally. So there is money in this space and we know that drives adoption more than anything else. Dollars talk, marketing walks to be frank. Finally, if you look at the report about email being the main vector of infection and compromise it should make anyone think, “Why is my organization continuing to invest in tech that is proven to not fix the issue?” That’s a logical question and the data proves it. Stop “trusting” humans and employ technology correctly.

Cyber News and Zero Trust Podcast: Subscribe to Chase’s podcast channel to hear him and his guests discuss the latest cybersecurity news. Listen on Spotify. Listen on iTunes. Follow Dr. Zero Trust on YouTube.

LinkedIn Live: Join Dr. Chase Cunningham for his LinkedIn Live podcasts on Wednesdays @ 1:00 pm ET. Click here to attend his event on Wednesday, August 10 @ 1:00 pm ET. 

“WAFs Must Die Like the Password and VPNs”: Click here to read Chase’s article.

This Week’s Posts

Email Is The Single Biggest Threat To Businesses, And Here’s What You Can Do About It

Email remains one of the most popular methods of business communications and is set to increase to 376.4 billion by 2025.

Read More

This Week’s Posts

Cyberattack on NHS Vendor Already Offering Critical Lessons

The U.K. urgent healthcare helpline is in its fourth day of degraded service following a Thursday cyberattack against a key service provider.

Read More

This Week’s Posts

What Developers Must Know about Zero Trust

This article covers how to start working with zero trust principles and ideas, solving the problem of open network access.

Read More

This Week’s Posts

Stand Down, Marketers: Zero Trust is Not a Product

ZT is not a solution that says whether or not users or devices can access a network. Instead it means requiring authorization and authentication of every user session.

Read More

This Week’s Posts

Army Software Factory CISO Explains Zero Trust Challenges

Angelica Phaneuf, Army Software Factory CISO, explains some of the steps that her organization has been taking to meet the needs of ZT mandates.

Read More

This Week’s Posts

Securing Containers With Zero-Trust Tools

As container environments grow in complexity, security requires a different security approach. SASE and ZTNA can help.

Read More

This Week’s Posts

Continuous scanning key to keeping SMBs safe

Implementing ZT security is becoming a goal for SMBs, and a vital step involves the implementation of continuous scanning for vulnerabilities.

Read More

This Week’s Posts

The (Often Ignored) Fundamentals of Zero Trust

For all the grandiose terminology and technical challenges it poses, ZT is a logical extension of cybersecurity concepts that have been around for decades.

Read More

Article

Putting Trust in Zero Trust

Zero-trust architecture offers a considerable security advantage because it limits how much information attackers can potentially access or damage and it prevents easy movement across a system.

Read More