Featured
Zero Trust Series, Episode 4 - Federal Government Considerations
Andrew Balzarini - andrew@wildflowerintl.com
Zero trust is a cybersecurity concept that assumes no implicit trust within the network, regardless of whether the source is internal or external to the network perimeter. For the federal government, implementing zero trust requires careful consideration of several factors.
All episodes
-
Zero Trust Series, Episode 1 - Zero Trust in Simple Terms
Andrew Balzarini - andrew@wildflowerintl.com
Cyberattacks are continually evolving in both sophistication and frequency, an unfortunate reality in today’s increasingly connected world. Thanks to a sudden shift to remote work, IT security perimeters extend well past an organization’s physical boundaries. In a hybrid workplace, the potential attack surface – any access point that stores, hosts, or accesses an organization’s resources – is difficult to protect using a traditional approach. Enter Zero Trust: a paradigm shift in how we think about and approach cybersecurity.
What is Zero Trust and why does it matter? Join Jeff Lockwood, Founder and CEO of Invicta Solutions Group, and Andrew Balzarini as they break down Zero Trust in simple, easy to understand terms.
-
Zero Trust Series, Episode 2 - A Brief History of Zero Trust
Andrew Balzarini - andrew@wildflowerintl.com
The concept of zero trust emerged in 2009 and challenged the traditional security model that relied on perimeter defense, assuming that everything inside the network is trustworthy. Initially proposed by John Kindervag, the Zero Trust model gained attention as cyber threats evolved beyond traditional defenses. The model gained momentum as cybersecurity professionals and companies recognized its effectiveness against increasingly sophisticated threats.
Google's implementation of a similar concept, BeyondCorp, reinforced the zero trust principles by adopting a model that focused on device and user authentication rather than a trusted network perimeter. This further popularized the idea of Zero Trust security beyond Forrester's initial concept.
Over time, with the rise in remote work, cloud computing, and diverse endpoint devices accessing networks, the Zero Trust model evolved into a comprehensive security strategy centered on continuous verification and strict access controls. While Zero Trust is becoming a guiding principle for modern cybersecurity frameworks, it can be surrounded by myths and misconceptions. -
Zero Trust Series, Episode 3 - Zero Trust Projects, Explained
Andrew Balzarini - andrew@wildflowerintl.com
Zero Trust projects aim to enhance security by assessing vulnerabilities, access controls, and potential risks at every level and creating a detailed roadmap to close security gaps and ensure continuous monitoring, strict access controls, and robust authentication methods throughout your network. This shift in perspective, from a perimeter-focused approach to one centered around continuous verification and strict access controls can be challenging, but your journey to get there doesn’t have to be.
Zero Trust flips the traditional notion of IT security on its head by assuming that no element, whether inside or outside the network, is automatically trustworthy. This shift in focus is crucial, but the road to get there can be complex. Join Jeff Lockwood, Founder & CEO of Invicta Solutions Group, and Andrew Balzarini for a journey through Zero Trust in the third Zero Trust episode.
-
Zero Trust Series, Episode 4 - Federal Government Considerations
Andrew Balzarini - andrew@wildflowerintl.com
Zero trust is a cybersecurity concept that assumes no implicit trust within the network, regardless of whether the source is internal or external to the network perimeter. For the federal government, implementing zero trust requires careful consideration of several factors.