Forrester TechnoPoliticsWith apologies to the late great President Ronald Reagan, "trust but verify" is outmoded advice when it comes to computer network security. So, why do so many information security professionals still think trusted and untrusted networks zones are still best practice? Most think that people are trusted or untrusted. The problem with that thinking is you never know who can or cannot be trusted. Remember wikileaks? It was an inside job.

The solution: Zero Trust – Verify Then Trust

Meet John Kindervag, Forrester Principal Analyst and a leading expert in network and information security. He says that firms must take a Zero Trust approach to network security that means "verify then trust". In this episode of Forrester TechnoPolitics, John describes the what, why, and how of the Zero Trust approach to network and information security.

Podcast: Zero Trust – Your Only Hope For A Secure Network (8 mins)

 

 

Click here to listen on iTunes.

About Forrester TechnoPolitics

Make the tough calls. That’s what independent insight and analysis is all about. Hosted by Mike Gualtieri, Forrester TechnoPolitics features independent analysis and commentary from Forrester analysts about hot technology and what it means to you and the world. Scripted? Absolutely not. Passionate? We live it every day. Courage to make the tough calls? You be the judge.

Click here to see all episodes of TechnoPolitics.

Producers: Rowan Curran, Nick Welles, Rachel Brown, Sarah Bookstein