
How to Attain Zero Trust - Rob Allen - BSW #366
1 October 2024 - 57 minsThe zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticing, but deployments require major architectural, hardware, and software changes to be successful.
Rob Allen, Chief Performance Officer at ThreatLocker, joins Business Security Weekly to discuss how their Zero Trust Endpoint Protection Platform can start to help you attain Zero Trust from your endpoints by:
Blocking Untrusted Software, Ringfenci...

North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491
28 mins
4 July Finished

Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet.. - SWN #490
31 mins
1 July Finished

Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337
38 mins
1 July Finished

The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1 hour 52 mins
30 June Finished