Ditch Your VPN for ZTNA & We'll Buy Out Your VPN Support Contract – Click Here! Learn How Web Application Isolation Secures 3rd Party/Unmanaged Devices – Click Here!

Insights and Ideas from Dr. Zero Trust

Dr. Chase Cunningham, Ericom Software Chief Strategy Officer and a leading cybersecurity expert and originator of Forrester’s ZTX Zero Trust Extended Framework, shares the latest cybersecurity and Zero Trust news that executives need to know.

 

Read Chase’s weekly summary and hand-picked articles below!
Enter your email address to get weekly insights and articles delivered to your inbox.



Weekly Summary (5/16/2022): The most notable publications this week on ZT speak to the defined progress that is being seen in big federal systems. There are some specific studies and publications showing how they are progressing, and it is significant. However, it’s worth noting that as is typically prescribed for organizations, each agency has adapted ZT to their specific needs and has a slightly different progression model. But progress is progress and things are appearing to get better slowly.

Cyber News and Zero Trust Podcast: Subscribe to Chase’s podcast channel to hear him and his guests discuss the latest cybersecurity news. Listen on Spotify. Listen on iTunes. Follow Dr. Zero Trust on YouTube.

New! LinkedIn Live: Join Dr. Chase Cunningham for his LinkedIn Live podcasts on Wednesdays @ 1:00 pm ET. Click here for his show on Wednesday, May 18. 

Dr. Zero Trust Survey: Chase is doing some new ZT research and invites you to participate. He will share the results publicly and publish a paper on the topic. Any help is appreciated! Click here.

This Week’s Posts

What's the difference between zero trust vs. defense in depth?

Evaluate the similarities and differences between zero trust vs. defense in depth for help deciding which cybersecurity framework to use.

Read More

This Week’s Posts

Compare zero trust vs. the principle of least privilege

Zero trust and the principle of least privilege provide frameworks for reducing risk via tightly controlling access. Learn how they compare and contrast.

Read More

This Week’s Posts

Taking a Zero Trust Approach to Malware

In this webinar on July 7, 2022, an expert panel will discuss challenges in dealing with increasingly prevalent and sophisticated malware-based attacks.

Read More

This Week’s Posts

Zero trust as foundation of API security

Without zero trust as the foundation of your security, APIs could become weak points because they are given access privileges to share data.

Read More

This Week’s Posts

Zero Trust, Cloud Adoption Drive Demand for Authorization

With zero trust and cloud infrastructures at the top of security practitioners' road maps, there has been an uptick in authorization-related initiatives.

Read More

This Week’s Posts

Progress report on federal zero trust adoption

A study from General Dynamics Information Technology (GDIT) measured zero trust maturity in federal agencies since the Executive Order was released.

Read More

This Week’s Posts

Zero Trust at the Source

It has been proven that Identifying risks early in the code development process reduces the cost of mitigation and overall cybersecurity impact.

Read More

This Week’s Posts

Extending Zero Trust Continued: Taking the Idea of “Trust Nothing” a Step Further

Discover the transformation companies can make by implementing an updated security position and why the Zero Trust framework is essential.

Read More

This Week’s Posts

Why Retailers Need Zero Trust to Combat Ransomware

It's essential for retailers to protect the integrity of transactions, customers’ data, and retail networks with an AI-based Zero Trust architecture.

Read More