Read the latest news from Dr. Zero Trust

Insights and Ideas from Dr. Zero Trust

Dr. Chase Cunningham, a leading cybersecurity expert and originator of Forrester’s ZTX Zero Trust Extended Framework, shares the latest cybersecurity and Zero Trust news that executives need to know.

 

Read Chase’s weekly summary and hand-picked articles below! Follow Dr. Zero Trust on YouTube and Spotify.
You can also get weekly insights and articles delivered to your inbox. Enter your email address below!



Weekly Summary (7/26/2021):The biggest news in a long time around Zero Trust came out this last week when the National Cyber Center of Excellence (NCCOE) notified the community that a group of vendors had been selected for participation in a Zero Trust program. The outcome of this program will certainly have a significant influence on the vendor and buyer community and is the first follow-on step to the Executive Order that was issued for ZT. I think what we really should note here is that formal steps are being taken which provide evidence of the Federal Government’s commitment to a long-term ZT implementation. Time will tell, but in the decades that I have been in this space, I can’t recall such a positive strategic step taking place around a formal program.

Cyber News and Zero Trust Podcast: Subscribe to Chase’s podcast channel to hear him and his guests discuss the latest cybersecurity news. Click here to listen on Spotify. Click here to listen on iTunes.

YouTube Conversation: Why is data security so damn hard?: Listen to Dr. Chase Cunningham’s (aka Dr. Zero Trust) conversation with the team at Nullafi about why data security is hard, what we should be doing, and how this space is evolving as threats evolve. Click here to watch on YouTube.

Article

Deploying zero trust security strategy in Covid-19 era

Zero trust approach effectively assumes that the perimeter is dead as a concept, and we can no longer operate on the idea of establishing a perimeter ..

Read More

Article

Canadian Bacon – Zero to Hero when it comes to Zero-Trust

Zero-Trust means a lot of different things to a lot of different people but we can all agree that zero-trust means exactly that! We will focus on a use case to define an approach we can take to determine the capabilities required to achieve zero-trust.

Read More

Article

Why 2021 NSA Zero Trust Guidance Is Important for Federal Cybersecurity

Here's a look at the recently published NSA Zero Trust guidance. Learn what it is, why it's important, and how federal cybersecurity teams can get started.

Read More

Article

What Zero Trust Can Bring to the Financial Sector - Banking Exchange

Financial services took a particularly hard hit in 2020 in terms of ransomware and other cyber-attacks Financial services took a particularly hard hit in 2020 in terms of ransomware and other cyber-attacks, to put it mildly. As with enterprises across most verticals, financial services organizations...

Read More

Article

SolarWinds Senate Hearing: Moving Forward It’s All About Zero Trust

We still don’t have a complete picture of what exactly happened during the SolarWinds attack in 2020, nor do we know the full extent yet of the damage or what the long-term impact may be....

Read More

Article

Why you need a Zero Trust approach in the design, manufacturing, and supply chain industry?

Zero Trust is the only approach that would enable manufacturers to implement a least privilege access.

Read More

Article

NSA Issues Guidance on Zero Trust Security Model

The NSA published a cybersecurity product to show how deploying Zero Trust security principles can better secure enterprise networks and sensitive data.

Read More

Article

Zero Trust for Software Updates

The next time you are evaluating a product to deploy on your network, remember to check how many network connections you are require to open.

Read More

Article

The key to zero trust security? Changing human behavior

People are typically considered the weakest link in the cybersecurity chain because they fall prey to phishing schemes, providing an entryway into the network.

Read More