Under lock and key. The principles of zero-trust
Listen now
Description
With legacy network solutions based on VPN, authenticated users used to gain access to everything on the same subnet. Only a password prevented unauthorized users from accessing a resource. Zero trust flipped that paradigm by allowing users to only “see” the specific applications and resources explicitly permitted by their company’s security policy. Where did zero trust come from and why should you care? Today’s guest is Bill Carter, Cato Networks’ sales engineer. We’ll talk about the principles of zero-trust, verification processes and how does a proper ZTNA architecture should look like.
More Episodes
Burnout in the workplace is a growing concern as more and more employees are feeling overwhelmed and exhausted by the demands of their jobs. Burnout can manifest in a variety of ways, including physical and emotional fatigue, lack of motivation, and difficulty concentrating. It can also lead to...
Published 03/21/23
Published 03/21/23
Product marketing for information technology services is a crucial aspect of any IT business. It involves effectively communicating the value and benefits of your services to potential customers, positioning them in the market, and ultimately driving sales.  In this episode, we're diving into the...
Published 02/14/23