ThreatTalk episode 13
Fundamentals of Zero Trust principles
How can anyone effectively manage their security when so much is literally outside their control in today’s age of cloud-based SaaS and BYOD? Enter Zero Trust architectures.
Zero Trust assumes that you can no longer trust any network interaction, whether inside or outside your perimeter. Cybersecurity specialist Michael Zuckerman of Infoblox joins us for this episode of the ThreatTalk podcast.
Listen in and learn how to bolster your security using Zero Trust principles, including DNS filtering, encryption and microsegmentation.
Michael Zuckerman, Consulting Senior Product Marketing Manager, Infoblox
Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity and enterprise-saas software markets. Zuckerman’s domain experience in cybersecurity over the past 5 years includes container security, moving target defense, network threat analysis (AI), sandbox, deception technology, continuous security validation, cloud access security brokers, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.
Peter Schooff, Editor-in-Chief and Co-Founder, Data Decisioning
Peter has over 20 years’ experience in various executive-level enterprise IT fields. He first developed a deep interest in security as the Director of Marketing for the email security company Message Partners. Peter has worked as Associate Editor, Managing Editor, and is now Editor-in-Chief and co-founder of DataDecisioning.com. Peter is known worldwide for his views on technology and was named among the Top 12 Influencers of Case Management through independent market research.