Dr. Chase Cunningham, a leading cybersecurity expert and originator of Forrester’s ZTX Zero Trust Extended Framework, shares the latest cybersecurity and Zero Trust news that executives need to know.
Weekly Summary (11/29/2021): Lots of conversation this week in the news around things to avoid and what not to do for Zero Trust. I think that is actually extremely useful and it is a good thing to see in the market. We always talk about what we should be doing, and sure that is useful, but honestly in this world knowing what not to do and what not to invest in based on others’ knowledge and experience is extremely valuable. Check out these articles and maybe you can learn something that is useful in the realm of what you should not be doing for ZT.
Cyber News and Zero Trust Podcast: Subscribe to Chase’s podcast channel to hear him and his guests discuss the latest cybersecurity news. Click here to listen on Spotify. Click here to listen on iTunes.
YouTube Conversation: Why is data security so damn hard?: Listen to Dr. Chase Cunningham’s (aka Dr. Zero Trust) conversation with the team at Nullafi about why data security is hard, what we should be doing, and how this space is evolving as threats evolve. Click here to watch on YouTube.
VPN vs Zero Trust
There are two different approaches for implementing this “zero trust” approach: VPNs and micro-segmentation. How do they compare and compete?Read More
Cybersecurity Leadership: Cut Through the ZT Hype
In this latest Cybersecurity Leadership panel podcast, the top minds in the sector weigh in on the present and future of Zero Trust.Listen Now
The role of visibility and analytics in zero trust architectures
Many in the networking space have started to ask about how network visibility analytics fit into the zero trust architecture equation.Read More
Rethinking the WAN: Zero Trust network access can play a bigger role
COVID-induced work-from-home prompted WAN innovations that demonstrate VPNs and SD-WAN aren’t the only good options.Read More
DoD DCIO: Zero Trust Offers ‘Fighting Chance’ Against Hackers
With cybercriminals becoming more sophisticated at disguising themselves as legitimate network users, a top Defense Department (DoD) IT official said this week that the Pentagon’s move to zero trust security architectures gives the agency a “fighting chance” to detect and eject hackers before they can do much damage.Read More
Stepping Up Security With a Zero-Trust Network
Governments are more digitally connected than ever before, making them more effective and constituent-friendly – but also increasing their vulnerability to cyberattacks.Read More
This Week’s Posts
Evolving Zero Trust—Lessons learned and emerging trends
Microsoft's whitepaper, Evolving Zero Trust, shares the key lessons they've learned by embracing Zero Trust to defend our own estate and as a guiding principle for the development of their products.Read More
Zero Trust: Getting the basics right
Confusion persists when it comes to deconstructing Zero Trust. Here, we put it into clearer focus so security teams can move on to bigger and better things. It starts with secure access built on Zero Trust Network Access (ZTNA).Read More
To improve resilience, augment zero-trust models
Zero-trust models are a start, but to improve resilience, they should be augmented and extended to include verification procedures, supply chain security and open source software.Read More