Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust Security

Tactics for when authorized users need to connect to network resources, or need to venture out to the web to complete important tasks. Continue reading Microsegmentation and Isolation: 2 Essential Strategies in Zero-Trust Security

Inner Circle Podcast Episode 021 – Wendy Nather Talks about the Value of Zero Trust Security

I was honored to have Wendy Nather, head of advisory CISOs for Duo Security–now part of Cisco, join me as my guest for this episode of the Inner Circle podcast. Wendy is one of the most respected voices in cybersecurity today–which also exp… Continue reading Inner Circle Podcast Episode 021 – Wendy Nather Talks about the Value of Zero Trust Security

Zero Trust Security Model

With so many breaches occurring worldwide and so many organizations and consumers being impacted, IT admins are shifting their attention to a zero trust security model. This concept has been around for a few years, but as digital assets become increasi… Continue reading Zero Trust Security Model

Podcast: The case for zero-trust networks

In the aftermath of the massive U.S. Office of Personnel Management data breach in 2015, then-Rep. Jason Chaffetz came out with recommendations that all government agencies adopt a “zero-trust” approach to cybersecurity. That concept was based on a model created by John Kindervag, a vice president and principal analyst at the time with Forrester Research, and now field chief technology officer at Palo Alto Networks. In a new CyberScoop podcast on next-generation security platforms, Kindervag explains what distinguishes zero-trust network security from other holistic security models and what enterprises and agencies can do to embrace it more fully to their networks. “The thing that distinguishes zero trust is we focus on the fundamental problem we have in cybersecurity today,” says Kindervag. The problem? The traditional trust model networks have relied upon is broken. “The trust model we have – that all users external to the network are untrusted and bad, […]

The post Podcast: The case for zero-trust networks appeared first on Cyberscoop.

Continue reading Podcast: The case for zero-trust networks