Dr. Chase Cunningham, Ericom Software Chief Strategy Officer and a leading cybersecurity expert and originator of Forrester’s ZTX Zero Trust Extended Framework, shares the latest cybersecurity and Zero Trust news that executives need to know.
Read Chase’s weekly summary and hand-picked articles below!
Enter your email address to get weekly insights and articles delivered to your inbox.
Weekly Summary (3/26/2023): More funding around ZT is the most interesting part of this week’s news. The majority of enterprises are allocating up to 30 percent of their IT budgets to align on ZT. Wow. Things get done when money gets spent, at least that is how it is supposed to work. A variety of research points to growth in ZT. You will also note some interesting developments around enabling ZT for mobile devices and how trust is either implied or not in digital systems by allowing access. I think you can get some real value out of the news this week. Enjoy!
Cyber News and Zero Trust Podcast: Subscribe to Chase’s podcast channel to hear him and his guests discuss the latest cybersecurity news. Listen on Spotify. Listen on iTunes. Follow Dr. Zero Trust on YouTube.
LinkedIn Live: To listen to Chase’s LinkedIn Live event on Wednesday, March 29 @ 1:00 pm ET, click here.
“WAFs Must Die Like the Password and VPNs”: Click here to read Chase’s article.
Article
Zero Trust now the fastest-growing network security segment
In December, Gartner claimed that, among other things, by 2025, over 60% of organizations will embrace ZT as a starting place for security.
Read MoreArticle
Zero Trust for the Highest Level of Data Protection, Security, and Privacy in the Cloud
To secure data and operations in a hybrid work environment, companies have been adopting a ZT approach.
Read MoreArticle
How Zero Trust Solutions Stop Fraud at the IRS
Health and civilian agencies see major benefits from ICAM solutions, a pillar of ZT, when protecting IT systems from phishing scams and fraudsters.
Read MoreArticle
Accurately assessing the success of ZT initiatives
As companies flirt with ZT adoption, they need to determine how the model helps them from both a security and business standpoint.
Read MoreArticle
To achieve ZT, Red Hat's Michael Epley says there's much work to be done
Epley shares his thoughts on whether the federal senior executives have full visibility of the gaps that must be closed to achieve ZT objectives.
Read MoreArticle
ZTNA and the Death of the Network Perimeter
ZTNA is becoming increasingly relevant as the concept of the perimeter, and the “castle-and-moat” mentality of cybersecurity, becomes obsolete.
Read MoreArticle
Outdated Operating Systems Remain Key Medical Device Security Challenge
Support for Windows 8.1 ended in January, sparking conversations about how to manage risks associated with out-of-date operating systems.
Read MoreArticle
Thunderdome hits its targets, DISA moves to next phase of zero trust
With Thunderdome, DISA moves to expand zero trust to more users and add a follow-on contract for applications.
Read MoreArticle
Zero Trust Offers a Foundation for Authentication and Access in Healthcare
Zero Trust provides a framework for clinician and hospital staff access to critical apps and patient data protection amid an increase in cyberattacks.
Read More