Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Health & Fitness
Sports
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts122/v4/e3/d7/b3/e3d7b389-cc4b-fc3a-63a1-689de1d8b646/mza_4737072946093988712.jpg/600x600bb.jpg
Strengthen and Streamline Your Security
IDG
4 episodes
2 months ago
This podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.
Show more...
Technology
News,
Tech News
RSS
All content for Strengthen and Streamline Your Security is the property of IDG and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
This podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.
Show more...
Technology
News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts122/v4/e3/d7/b3/e3d7b389-cc4b-fc3a-63a1-689de1d8b646/mza_4737072946093988712.jpg/600x600bb.jpg
Episode 3: The Zero Trust Model
Strengthen and Streamline Your Security
15 minutes
4 years ago
Episode 3: The Zero Trust Model
Trust. It’s essential in successful relationships. A lack of trust among people can be hurtful – or demeaning. But in security, trusting no one — or nothing — until it is verified is becoming a smart strategy for defensive posture. It’s a concept known as Zero Trust.  A Zero Trust model embraces three principles: Verify explicitly, by continuously authenticating and authorizing access Use least-privileged policies to limit user access with just-in-time and just-enough-access, and Assume breach, which minimizes a breach radius by segmenting access by network, user, devices, and app awareness. Zero Trust is different from a perimeter-based defense because instead of only building a moat, security teams also focus on protecting what’s inside the perimeter with strong authentication and security standards that minimize privileges, giving users access only to those things they need to do their work. Zero Trust is catching on in the enterprise: IDG’s 2020 Security Priorities study shows that one in four companies have deployed Zero Trust technologies and another 50% are researching or piloting Zero Trust solutions. In this episode, we look at the steps organizations are taking toward Zero Trust and provide recommendations for making the most of a Zero Trust model to reduce risk while helping employees be more productive, regardless of where they’re working from.
Strengthen and Streamline Your Security
This podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.