『"No Trust" by Zero Trust Forum』のカバーアート

"No Trust" by Zero Trust Forum

"No Trust" by Zero Trust Forum

著者: "No Trust" by Zero Trust Forum
無料で聴く

このコンテンツについて

Listen to experts discuss the latest in Zero Trust security on our podcast! Explore topics like adaptive access control, data protection, and insider threat mitigation. Stay informed about Zero Trust architecture, best practices, and real-world case studies to enhance your cybersecurity strategy. Tune in for insights and advice on building a resilient, secure infrastructure.All rights reserved
エピソード
  • From Theory to Practice: The Zero Trust Journey - Episode 2, with John Kindervag and Dr Chase Cunningham
    2025/04/17
    From Theory to Practice: The Zero Trust Journey - Episode 2, with John Kindervag and Dr Chase Cunningham by "No Trust" by Zero Trust Forum
    続きを読む 一部表示
    44 分
  • Surviving the Ransomware Threat with Art Ocain
    2025/04/01
    In this conversation, Art Ocain discusses the current landscape of cybersecurity threats with the No Trust crew, particularly focusing on ransomware attacks. They explore how attackers gain access to systems, the importance of multi-factor authentication, and the vulnerabilities of small and medium-sized businesses. The conversation delves into immediate actions organizations should take during a ransomware attack, the balance between recovery and forensic investigation, and the critical role of communication during incidents. They also address the ethical dilemma of paying ransoms and share lessons learned from past incidents, emphasizing the need for ongoing security improvements and preparedness for future threats. Takeaways • VPN is currently the main vector for attacks • Small and medium businesses are often less prepared for attacks • Many companies still lack MFA on their VPNs • Organizations often believe they are immune to attacks until it's too late • Hypervisors are a primary target for ransomware attacks • Minimizing the attack surface is crucial for security • Isolating from the internet is a key first step during an attack • The decision to pay ransom is complex and often driven by immediate business needs • A full forensic investigation is essential after an attack • Ransomware trends continue to evolve and are not declining Follow & Subscribe on all Podcast platforms. link.chtbl.com/XIW5zsAn What is the Zero Trust Forum about? It’s about empowering zero trust security professionals with strategies, architecture, and real world journeys to secure the digital future, the right way! Follow the Zero Trust Forum on LinkedIn www.linkedin.com/company/zero-trust-forum/. Follow Jaye Tillson on LinkedIn - www.linkedin.com/in/jaye-tillson/ Follow John Spiegel on LinkedIn - www.linkedin.com/in/john-spiegel-2011543/ Takeaways • Identity is the heart of zero trust. • Most breaches occur due to weak passwords. • Identity is the key to the perimeter. • Assuming trust can lead to vulnerabilities. • Zero trust is a continuous journey. • Organizations need visibility into their identity landscape. • AI can assist in analyzing identity-related data. • Non-human identities are a growing concern. • MFA is essential but not the only solution. • The future of identity management will involve AI. Follow & Subscribe on all Podcast platforms. link.chtbl.com/XIW5zsAn What is the Zero Trust Forum about? It’s about empowering zero trust security professionals with strategies, architecture, and real world journeys to secure the digital future, the right way! Follow the Zero Trust Forum on LinkedIn www.linkedin.com/company/zero-trust-forum/. Follow Jaye Tillson on LinkedIn - www.linkedin.com/in/jaye-tillson/ Follow John Spiegel on LinkedIn - www.linkedin.com/in/john-spiegel-2011543/
    続きを読む 一部表示
    46 分
  • Identity in the Age of Zero Trust
    2025/03/10
    In this conversation, David Morimanno and the No Trust crew delve into the critical role of identity in the context of zero trust security. They discuss how identity serves as the new perimeter, the importance of multi-factor authentication, and the challenges organizations face in implementing effective identity management strategies. The conversation also touches on the significance of non-human identities, the potential of AI in enhancing security measures, and the future trends in identity and cybersecurity. Takeaways • Identity is the heart of zero trust. • Most breaches occur due to weak passwords. • Identity is the key to the perimeter. • Assuming trust can lead to vulnerabilities. • Zero trust is a continuous journey. • Organizations need visibility into their identity landscape. • AI can assist in analyzing identity-related data. • Non-human identities are a growing concern. • MFA is essential but not the only solution. • The future of identity management will involve AI. Follow & Subscribe on all Podcast platforms. link.chtbl.com/XIW5zsAn What is the Zero Trust Forum about? It’s about empowering zero trust security professionals with strategies, architecture, and real world journeys to secure the digital future, the right way! Follow the Zero Trust Forum on LinkedIn www.linkedin.com/company/zero-trust-forum/. Follow Jaye Tillson on LinkedIn - www.linkedin.com/in/jaye-tillson/ Follow John Spiegel on LinkedIn - www.linkedin.com/in/john-spiegel-2011543/
    続きを読む 一部表示
    47 分

"No Trust" by Zero Trust Forumに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。