Artwork

Content provided by Chris Glanden. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Chris Glanden or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Zero Proof

57:54
 
Share
 

Manage episode 304883822 series 2798298
Content provided by Chris Glanden. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Chris Glanden or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Organizations are increasingly adopting a Zero Trust model, which is based on the philosophy that there should be no implicit trust in a corporate network. Rooted in the principle of “Never Trust, Always Verify”, Zero Trust is designed to protect modern digital environments against successful data breaches. While it has existed for over a decade, Zero Trust is one of the most misused “buzzwords” in the industry today. Vendor marketing and other misleading data has unfortunately caused mass confusion about what Zero Trust really is and how to use it properly.
Former Forrester Research analyst and creator of Zero Trust, John Kindervag, stops in to demystify the term, while explaining how it’s a proven security strategy within enterprise security. Our conversation at the bar includes properly defining the term, the value of adoption, implementation techniques, exemptions, and more!
SYMLINKS
LinkedIn
Twitter
ON2IT
Zero Trust (Wikipedia)
No More Chewy Centers: Introducing The Zero Trust Model Of Information Security (2010)
Build Security Into Your Network’s DNA: The Zero Trust Network Architecture (2010)
Biden Executive Order on Improving the Nation’s Cybersecurity
The US vs PCF Manning case
The Conrad Hilton Hotel Bar (Dublin)
The Claridge Hotel Bar (London)
Driscol Hotel Bar (Austin TX)
DRINK INSTRUCTION
PYTHON
1 1/2 oz White Rum
1 oz Mint Liqueur
1 oz Pineapple Juice
Lemon Lime Soda
Half Lemon
Add all ingredients into a cocktail shaker. Shake and strain over glass with ice. Squeeze half of lemon in. Top with Lemon Lime soda.

CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at info@barcodesecurity.com

  continue reading

110 episodes

Artwork

Zero Proof

BarCode

22 subscribers

published

iconShare
 
Manage episode 304883822 series 2798298
Content provided by Chris Glanden. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Chris Glanden or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Organizations are increasingly adopting a Zero Trust model, which is based on the philosophy that there should be no implicit trust in a corporate network. Rooted in the principle of “Never Trust, Always Verify”, Zero Trust is designed to protect modern digital environments against successful data breaches. While it has existed for over a decade, Zero Trust is one of the most misused “buzzwords” in the industry today. Vendor marketing and other misleading data has unfortunately caused mass confusion about what Zero Trust really is and how to use it properly.
Former Forrester Research analyst and creator of Zero Trust, John Kindervag, stops in to demystify the term, while explaining how it’s a proven security strategy within enterprise security. Our conversation at the bar includes properly defining the term, the value of adoption, implementation techniques, exemptions, and more!
SYMLINKS
LinkedIn
Twitter
ON2IT
Zero Trust (Wikipedia)
No More Chewy Centers: Introducing The Zero Trust Model Of Information Security (2010)
Build Security Into Your Network’s DNA: The Zero Trust Network Architecture (2010)
Biden Executive Order on Improving the Nation’s Cybersecurity
The US vs PCF Manning case
The Conrad Hilton Hotel Bar (Dublin)
The Claridge Hotel Bar (London)
Driscol Hotel Bar (Austin TX)
DRINK INSTRUCTION
PYTHON
1 1/2 oz White Rum
1 oz Mint Liqueur
1 oz Pineapple Juice
Lemon Lime Soda
Half Lemon
Add all ingredients into a cocktail shaker. Shake and strain over glass with ice. Squeeze half of lemon in. Top with Lemon Lime soda.

CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at info@barcodesecurity.com

  continue reading

110 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide