full

full
Published on:

6th Feb 2020

13. Fundamentals of Zero Trust Principles

How can anyone manage their security when so much is literally out of their control within a 3rd party SaaS or BYOD? 

A breach is going to happen so limit the impact using Zero Trust principles: 

  • Focus on the Data
  • Trust no user 
  • Trust no communication
  • Deny access by default and provide minimal access when required  

Consulting Senior Product Marketing Manager at Infoblox, Michael Zuckerman, joins Threat Talk to discuss Zero Trust in detail.  Designed with Data at the heart of the protection strategy, Zero Trust uses fundamental IT technology such as DNS filtering, encryption and microsegmentation as key components to control access and limit exposure.

You can find this interview, and many more, by subscribing to the ThreatTalk podcast on Apple Podcasts or on Spotify.

Listen for free

Show artwork for Infoblox ThreatTalk

About the Podcast

Infoblox ThreatTalk
In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications.

The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions.

In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual and public, private and hybrid cloud infrastructure.

Topics include secure cloud migration, DNS security, malware mitigation, infrastructure protection, integrated threat response and much more.

About your host

Profile picture for Infoblox Media

Infoblox Media