How can anyone manage their security when so much is literally out of their control within a 3rd party SaaS or BYOD?  A breach is going to happen so limit the impact using Zero Trust principles:  Focus on the Data Trust no user  Trust no communication Deny access by default and provide minimal access when required   Consulting Senior Product Marketing Manager at Infoblox, Michael Zuckerman, joins Threat Talk to discuss Zero Trust in detail.  Designed with Data at the heart of the protection strategy, Zero Trust uses fundamental IT technology such as DNS filtering, encryption and microsegmentation as key components to control access and limit exposure. You can find this interview, and many more, by subscribing to the ThreatTalk podcast on Apple Podcasts or on Spotify.

Podden och tillhörande omslagsbild på den här sidan tillhör Infoblox. Innehållet i podden är skapat av Infoblox och inte av, eller tillsammans med, Poddtoppen.