Dr. Chase Cunningham, Ericom Software Chief Strategy Officer and a leading cybersecurity expert and originator of Forrester’s ZTX Zero Trust Extended Framework, shares the latest cybersecurity and Zero Trust news that executives need to know.
Read Chase’s weekly summary and hand-picked articles below!
Enter your email address to get weekly insights and articles delivered to your inbox.
Weekly Summary (5/16/2022): The most notable publications this week on ZT speak to the defined progress that is being seen in big federal systems. There are some specific studies and publications showing how they are progressing, and it is significant. However, it’s worth noting that as is typically prescribed for organizations, each agency has adapted ZT to their specific needs and has a slightly different progression model. But progress is progress and things are appearing to get better slowly.
Cyber News and Zero Trust Podcast: Subscribe to Chase’s podcast channel to hear him and his guests discuss the latest cybersecurity news. Listen on Spotify. Listen on iTunes. Follow Dr. Zero Trust on YouTube.
New! LinkedIn Live: Join Dr. Chase Cunningham for his LinkedIn Live podcasts on Wednesdays @ 1:00 pm ET. Click here for his show on Wednesday, May 18.
Dr. Zero Trust Survey: Chase is doing some new ZT research and invites you to participate. He will share the results publicly and publish a paper on the topic. Any help is appreciated! Click here.
How Zero Trust Modernized Grants Management at Justice Department
The Office of Justice Programs has been integrating zero trust frameworks into the modernization of its grants management system over the past few years.Read More
Case Study: Where to Begin Your Zero Trust Journey
According to Amit Basu of International Seaways, it's best to start with a network approach when embarking on a Zero Trust journey.Listen Now
Pragmatic Steps Toward Zero Trust
A pure zero trust architecture may still be out of reach for all but the largest, most well-funded organizations, but that doesn’t mean we can’t all take steps in that direction.Read More
Why It’s Time to Stop Putting off Zero Trust
As we watch threats evolve and breaches become even more devastating, the need for organizations to get started with zero trust strategies has never been more apparent.Read More
Thunderdome is DISA’s 'Trial-By-Fire' Answer to Zero Trust Architecture
DISA is making a bold move away from its legacy guard-the-perimeter approach to holistic network security, and Thunderdome is its jumping-off point for building a comprehensive zero trust architecture.Read More
6 Unexpected Roadblocks Organizations Face with Zero Trust
A little strategic planning can make for a much smoother ride to Zero Trust security. This article shares the six most common roadblocks organizations encounter while switching to Zero Trust.Read More
Sky Mavis plans to become a 'zero-trust organization' after $600 million Ronin hack
Sky Mavis, the company behind the play-to-earn game Axie Infinity, said it is looking to become a “zero-trust organization" in the wake of last month's $600 million attack on the Ronin network.Read More
Zero Trust 'Essential' and 'Integral' to JADC2
DOD leaders say you can't have Joint All Domain Command-and-Control (JADC2) without zero trust and a "data-centric" approach to cyber.Read More
Application Programming Interfaces (APIs): The Soft Underbelly of Zero Trust
Although interest in ZT is strong and the effort to improve is meaningful, the outcome will be less than expected if API security is not included.Read More