Ericom ZTEdge Named "Outperformer" on GigaOM Radar – Click Here! Learn How Web Application Isolation Secures 3rd Party/Unmanaged Devices – Click Here! Ericom Software and ZTEdge Win 5 Global InfoSec Awards – Click Here!

Insights and Ideas from Dr. Zero Trust

Dr. Chase Cunningham, Ericom Software Chief Strategy Officer and a leading cybersecurity expert and originator of Forrester’s ZTX Zero Trust Extended Framework, shares the latest cybersecurity and Zero Trust news that executives need to know.

 

Read Chase’s weekly summary and hand-picked articles below!
Enter your email address to get weekly insights and articles delivered to your inbox.



Weekly Summary (8/8/2022): The movement marches onward, and wow, are there dollars to back that assertion up. The report this week on the growth of the ZT specific market is staggering. I don’t recall seeing numbers like these on a security market sector anytime in my memory. The ZT market is estimated to have about a 17 percent CAGR in the next 6 years and hit roughly $70 billion globally. So there is money in this space and we know that drives adoption more than anything else. Dollars talk, marketing walks to be frank. Finally, if you look at the report about email being the main vector of infection and compromise it should make anyone think, “Why is my organization continuing to invest in tech that is proven to not fix the issue?” That’s a logical question and the data proves it. Stop “trusting” humans and employ technology correctly.

Cyber News and Zero Trust Podcast: Subscribe to Chase’s podcast channel to hear him and his guests discuss the latest cybersecurity news. Listen on Spotify. Listen on iTunes. Follow Dr. Zero Trust on YouTube.

LinkedIn Live: Join Dr. Chase Cunningham for his LinkedIn Live podcasts on Wednesdays @ 1:00 pm ET. Click here to attend his event on Wednesday, August 10 @ 1:00 pm ET. 

“WAFs Must Die Like the Password and VPNs”: Click here to read Chase’s article.

Article

WH Official Details How OMB is Measuring Zero Trust Progress

A White House official said agencies’ success in the effort to migrate to ZT security architectures will look different for the policy’s various directives.

Read More

Article

Zero trust adoption: Industry-specific challenges and implementation strategies

Organizations across many industries are in the throes of a journey to implement the zero trust security model to increase their cybersecurity posture.

Read More

Article

Zero-Trust and the Public Cloud

The ZT school of thought resides on three pillars: attack containment, attack identification and defense, and a higher bar for identity protection.

Read More

Article

Microsoft details Zero Trust transition, challenges

Over the past three years, Microsoft has moved to a Zero Trust framework. Security engineers outlined the transition and its challenges during a session at RSA Conference 2022.

Read More

Article

Why CIOs must lead on cybersecurity and become champions for Zero Trust

The role of the CIO has become more important than ever as organizations have shifted to remote work and ramped up their IT and cybersecurity infrastructures and policies to meet this increased demand for services.

Read More

Article

RSA 2022: NIST Releases Draft Zero-Trust Architecture Guide

NIST’s National Cybersecurity Center of Excellence has released the first of several preliminary drafts outlining ways that organizations can implement Zero Trust architectures.

Read More

Article

How the C-Suite Puts Shoulders Into Zero Trust in 2022

Executive leaders across organizations are prioritizing zero-trust security strategies in the next year, as organizations hope to build significantly on early baby steps in these initiatives.

Read More

Article

CISA CIO Focused on Building Zero Trust Foundation

Building a ZT security architecture that underlies better cybersecurity capabilities is at the top of the list for Robert Costello, Chief Information Officer at the Cybersecurity and Infrastructure Security Agency (CISA).

Read More

Article

How to Write a Zero Trust Proposal 

Even tech-savvy CEOs may not grasp why their legacy networks became vulnerable after the shift toward remote workers using cloud-based services. Ensure they truly understand thee risks with a compelling proposal.

Read More