Weekly cybersecurity news August 16, 2023 with Dr. Chase Cunningham

News By Daniel Michan Published on August 16, 2023

Things You Need to Know About Zero Trust Security

Hey there! Dr. Chase Cunningham here, also known as Dr. Zero Trust. In this article, I'll be discussing the top ten things you need to know about Zero Trust, a cutting-edge cybersecurity approach. So, let's dive in!

1. DoD's Zero Trust Journey

The Department of Defense (DoD) has recently published a comprehensive breakdown of their adoption of Zero Trust. This is significant because if the DoD can implement Zero Trust successfully, it suggests that any organization, regardless of its size, can do the same. It's encouraging to note that two-thirds of government agencies involved in this initiative have already achieved their Zero Trust objectives. This means that if you're a small or mid-sized business, it should be even easier for you to implement Zero Trust, as long as you're not slower than the federal government!

2. Zero Trust in the Cloud

If you're considering migrating to the cloud or already have a presence there, it's crucial to understand how to implement Zero Trust effectively in that environment. An article on Security Boulevard offers valuable insights into the right way to approach Zero Trust in a cloud setting. The perspective shared in this article is highly recommended and can guide you in securing your cloud infrastructure.

3. Explosive Growth in the Zero Trust Market

The Zero Trust market is experiencing significant growth, with a compound annual growth rate (CAGR) of over 20% year over year, according to a ZT market analysis. This rapid expansion indicates that Zero Trust is becoming a thriving area for innovation and investment. While the analysis primarily focuses on major players in the field, it still provides valuable insights into the growth and potential of Zero Trust as a cybersecurity approach.

4. Don't Overinvest in Zero Trust

While investing in Zero Trust is crucial, it's equally essential to avoid overinvesting in it. A report on CRN.com addresses this specific concern and highlights areas where organizations shouldn't excessively allocate funds. It emphasizes the importance of having a strategy that allows you to retire outdated security tools or practices effectively. As technology evolves, it's crucial to assess and replace any components that no longer contribute to your security posture.

5. Zero Trust in Education

Zero Trust is not limited to government or enterprise organizations; it's also highly relevant in educational institutions. An article on eSchool News makes a compelling case for implementing Zero Trust in schools. Given how students increasingly rely on digital tools and platforms for their education, securing these technological resources is of paramount importance. If it's good enough for the federal government, it should be good enough for schools to protect their students' and staff's sensitive information.

6. Checkpoint's Acquisition of Perimeter 81

Checkpoint, a prominent cybersecurity company, recently acquired Perimeter 81 for nearly half a billion dollars. This acquisition begs the question: Does it enhance Checkpoint's position in the market for Zero Trust solutions? It's worth exploring whether this acquisition is merely an attempt to gain market share or a strategic move to strengthen Checkpoint's cybersecurity and Zero Trust capabilities. The report on CISO Online provides valuable insights into this acquisition and its potential impact.

7. DoD's Challenges in Implementing Zero Trust

The DoD, one of the frontrunners in adopting Zero Trust, faces its fair share of challenges. An article written by Randy Resnick, a key figure in the DoD's Zero Trust program, dives deep into the obstacles the organization encounters on this security journey. It's always valuable to gain ground truth from someone directly involved in a large-scale implementation. Reading this article will help you understand the real-world issues faced by the government and the lessons that can be learned from their experiences.

8. Security Guidelines for Electric Vehicle Charging Stations

In recent draft guidelines, electrical vehicle (EV) charging stations have been categorized as critical infrastructure. This change means that these charging stations now need to adhere to stringent security protocols. Measures such as segmentation, isolation, and multifactor authentication should be in place to safeguard these EV charging stations. This development underlines the importance of security in all aspects of modern life, including emerging technologies like EV charging infrastructure.

9. Discord's Breach Admission

Discord, a popular communication platform, recently faced a breach in which the information of nearly a million users was compromised. Interestingly, this incident comes after Discord's initial claim of an attack, followed by the denial that any data had been accessed. This breach reaffirms the significance of acknowledging and addressing security incidents transparently. Organizations should avoid downplaying or denying breaches, as it erodes trust and fails to inform users about potential risks.

Wrapping Up

That's a wrap for the ten things you need to know about Zero Trust security! Stay up to date with the latest developments in Zero Trust to ensure you're well-equipped to protect your organization's digital assets. Remember, Zero Trust is not just reserved for the government or large corporations; it can be implemented by any organization, regardless of its size. Implementing Zero Trust is a proactive step towards minimizing cybersecurity risks and safeguarding your critical data.