How to Attain Zero Trust - Rob Allen - BSW #366
1 October - 57 minsThe zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticing, but deployments require major architectural, hardware, and software changes to be successful.
Rob Allen, Chief Performance Officer at ThreatLocker, joins Business Security Weekly to discuss how their Zero Trust Endpoint Protection Platform can start to help you attain Zero Trust from your endpoints by:
Blocking Untrusted Software, Ringfenci...
Dysentery, TP-Link, Piracy, Calendar Scams, Tencent, TikTok, Aaran Leyland and More.. - SWN #439
36 mins
20 December Finished
D3FEND 1.0: A Milestone in Cyber Ontology - Peter Kaloroumakis - ESW #388
1 hour 42 mins
20 December Finished
When Public Payphones Become Smart Phones - Inbar Raz - PSW #855
2 hours 47 mins
19 December Finished
NAC is Back - How Network Access Control Can Protect Your Remote Devices and Data - Rob Allen - BSW #376
55 mins
18 December Finished
Vogons, Task Scams, HiatusRat, Cellebrite, Deloitte, Quantum, Aaran Leyland, and More - SWN #438
40 mins
17 December Finished
Applying Usability and Transparency to Security - Hannah Sutor - ASW #311
1 hour 9 mins
16 December Finished