Dr. Chase Cunningham, Ericom Software Chief Strategy Officer and a leading cybersecurity expert and originator of Forrester’s ZTX Zero Trust Extended Framework, shares the latest cybersecurity and Zero Trust news that executives need to know.
Read Chase’s weekly summary and hand-picked articles below!
Enter your email address to get weekly insights and articles delivered to your inbox.
Weekly Summary (8/8/2022): The movement marches onward, and wow, are there dollars to back that assertion up. The report this week on the growth of the ZT specific market is staggering. I don’t recall seeing numbers like these on a security market sector anytime in my memory. The ZT market is estimated to have about a 17 percent CAGR in the next 6 years and hit roughly $70 billion globally. So there is money in this space and we know that drives adoption more than anything else. Dollars talk, marketing walks to be frank. Finally, if you look at the report about email being the main vector of infection and compromise it should make anyone think, “Why is my organization continuing to invest in tech that is proven to not fix the issue?” That’s a logical question and the data proves it. Stop “trusting” humans and employ technology correctly.
Cyber News and Zero Trust Podcast: Subscribe to Chase’s podcast channel to hear him and his guests discuss the latest cybersecurity news. Listen on Spotify. Listen on iTunes. Follow Dr. Zero Trust on YouTube.
LinkedIn Live: Join Dr. Chase Cunningham for his LinkedIn Live podcasts on Wednesdays @ 1:00 pm ET. Click here to attend his event on Wednesday, August 10 @ 1:00 pm ET.
“WAFs Must Die Like the Password and VPNs”: Click here to read Chase’s article.
This Week’s Posts
Email Is The Single Biggest Threat To Businesses, And Here’s What You Can Do About It
Email remains one of the most popular methods of business communications and is set to increase to 376.4 billion by 2025.
Read MoreThis Week’s Posts
Cyberattack on NHS Vendor Already Offering Critical Lessons
The U.K. urgent healthcare helpline is in its fourth day of degraded service following a Thursday cyberattack against a key service provider.
Read MoreThis Week’s Posts
What Developers Must Know about Zero Trust
This article covers how to start working with zero trust principles and ideas, solving the problem of open network access.
Read MoreThis Week’s Posts
Stand Down, Marketers: Zero Trust is Not a Product
ZT is not a solution that says whether or not users or devices can access a network. Instead it means requiring authorization and authentication of every user session.
Read MoreThis Week’s Posts
Army Software Factory CISO Explains Zero Trust Challenges
Angelica Phaneuf, Army Software Factory CISO, explains some of the steps that her organization has been taking to meet the needs of ZT mandates.
Read MoreThis Week’s Posts
Securing Containers With Zero-Trust Tools
As container environments grow in complexity, security requires a different security approach. SASE and ZTNA can help.
Read MoreThis Week’s Posts
Continuous scanning key to keeping SMBs safe
Implementing ZT security is becoming a goal for SMBs, and a vital step involves the implementation of continuous scanning for vulnerabilities.
Read MoreThis Week’s Posts
The (Often Ignored) Fundamentals of Zero Trust
For all the grandiose terminology and technical challenges it poses, ZT is a logical extension of cybersecurity concepts that have been around for decades.
Read MoreArticle
Putting Trust in Zero Trust
Zero-trust architecture offers a considerable security advantage because it limits how much information attackers can potentially access or damage and it prevents easy movement across a system.
Read More