How to Attain Zero Trust - Rob Allen - BSW #366
1 October 2024 - 57 minsThe zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticing, but deployments require major architectural, hardware, and software changes to be successful.
Rob Allen, Chief Performance Officer at ThreatLocker, joins Business Security Weekly to discuss how their Zero Trust Endpoint Protection Platform can start to help you attain Zero Trust from your endpoints by:
Blocking Untrusted Software, Ringfenci...
Cybersecurity Hiring Trends as Boards Bridge Confidence Gap and Build Strategic Lever - Jim McCoy - BSW #426
54 mins
17 December Finished
Pornhub, WSL, Santastealer, Geoserver, Webkit, Fortiyomama, Dad's pix, Aaran Leyland. - SWN #538
34 mins
16 December Finished
Developing Open Source Skills for Maintaining Projects - Kat Cosgrove - ASW #361
1 hour 3 mins
16 December Finished
Illuminating Data Blind Spots, Topic, Enterprise News - Tony Kelly - ESW #437
1 hour 49 mins
15 December Finished
Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet... - SWN #537
30 mins
12 December Finished
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2 hours 7 mins
11 December Finished