Dr. Chase Cunningham, a leading cybersecurity expert and originator of Forrester’s ZTX Zero Trust Extended Framework, shares the latest cybersecurity and Zero Trust news that executives need to know.
Weekly Summary (10/18/2021): Lots of growth in the ZT world this week! More news and articles from the APAC region are showing up all of the time and the evolution of the market continues to extend and grow internationally. What we see is the “natural” development of the world following the US’s lead in security adoption, which is to be expected. I think we will see even more adoption in those regions and EMEA can’t be far behind.
Cyber News and Zero Trust Podcast: Subscribe to Chase’s podcast channel to hear him and his guests discuss the latest cybersecurity news. Click here to listen on Spotify. Click here to listen on iTunes.
YouTube Conversation: Why is data security so damn hard?: Listen to Dr. Chase Cunningham’s (aka Dr. Zero Trust) conversation with the team at Nullafi about why data security is hard, what we should be doing, and how this space is evolving as threats evolve. Click here to watch on YouTube.
Zero Trust Adoption: Managing Risk with Cybersecurity Engineering and Adaptive Risk Assessment
Zero trust adoption challenges many organizations. It isn't a specific technology to adopt, but a security initiative that an enterprise must understand, interpret, and implement.Read More
Zero Trust Journey - A Security Leader’s Story
Most security professionals acknowledge that the traditional “castle-and-moat” approach to security no longer works, and would like to achieve a Zero Trust security posture in their organizations.Read More
VPN's Days Are Numbered: Here Comes Zero-Trust Security
Despite providing generally fast and reliable remote security during the COVID-19 pandemic, VPN may soon be replaced by an even more resilient technology - zero-trust security.Read More
Zero Trust: When “Trust But Verify” Is Not Enough
When friends became enemies, we all started to wonder what’s wrong. And that quickly turns into the question of whether trust innately is the problem.Read More
Deploying zero trust security strategy in Covid-19 era
Zero trust approach effectively assumes that the perimeter is dead as a concept, and we can no longer operate on the idea of establishing a perimeter with people are working from different locations.Read More
Delivering zero trust environments with Amazon AppStream 2.0
This session is designed for Solution Architects looking to provision desktop applications in a zero trust environment and improve the usability and security of how people access applications.Read More
The Case for 'Zero Trust' Approach After SolarWinds Attack
The SolarWinds supply chain attack should push federal government agencies to adopt the "zero trust" model and deploy better endpoint detection.Read More
How Zero Trust 2.0 can answer every organisation’s cyber woes
How can Zero Trust 2.0 help enterprises shrink their attack surface and achieve greater balance between adding appropriate friction in the authentication process and protecting user experience?Read More
Zero Trust Manufacturing Approach Key to Balancing Complex Supply Chains and IoT Device Security
A zero-trust manufacturing architecture can ensure that a product’s firmware, data and digital credentials can be trusted through every step of the supply chain.Read More