Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first).
…
continue reading
Adopting Zero Trust Podcasts
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
continue reading

1
Understanding Microsoft Zero Trust DNS with Aditi Patange
46:33
46:33
Play later
Play later
Lists
Like
Liked
46:33In this episode of the Defenders Log, we have Aditi Patange from Microsoft alongside our hosts, David Redekop and Francois from Adam Networks, for an in-depth discussion on Zero Trust DNS, a new enterprise security feature within Windows 11. Aditi shares his background in computer engineering and product management and how his work contributes to c…
…
continue reading

1
Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48In today's episode of the Defender's Log, we welcome special guest Tommy Jensen, an internet technologist with expertise in IPv6, Zero Trust, and standards. The episode covers Jensen's career journey from an AppleCare contractor to a pivotal role in advancing internet technologies. The discussion delves into the importance and challenges of migrati…
…
continue reading

1
Defending the DNS: How Quad9 Protects the Internet | John Todd, CTO - Quad9
52:30
52:30
Play later
Play later
Lists
Like
Liked
52:30In this episode of 'The Defender's Log,' host David engages in a comprehensive discussion with John Todd, an influential figure in the defense technology space and a key player at Quad9. The conversation covers John's career journey, starting from the early days of commercial internet services to his current role at Quad9. They delve into the impor…
…
continue reading

1
Cybersecurity Explained: Privacy, Threats, and the Future | Chester Wisniewski
36:11
36:11
Play later
Play later
Lists
Like
Liked
36:11In the inaugural episode of 'The Defender’s Log,' host David Redekop converses with cybersecurity veteran Chester Wisniewski to explore the dynamic field of cybersecurity. They discuss the differentiation between privacy and security, the evolution of hacking from the 1980s to the present, and pivotal moments that reshaped information security. Che…
…
continue reading

1
How Critical Infrastructure Leaders Are Rethinking Cybersecurity
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32In this episode of Adopting Zero Trust, hosts Elliot Volkman and Neal Dennis discuss critical infrastructure security with expert guest Ian Branson, Vice President of Global Industrial Cybersecurity at Black and Veatch. The discussion centers around the philosophical and strategic approaches to handling incidents and breaches, especially in the ope…
…
continue reading

1
Shadows Within Shadows: How AI is Challenging IT Teams
48:12
48:12
Play later
Play later
Lists
Like
Liked
48:12In this episode of Adoption Zero Trust (AZT), host Neal Dennis and producer Elliot Volkman sit down with Bradon Rogers, Chief Customer Officer at Island, to discuss how AI is compounding the already existing problems tied to shadow IT. The conversation explores how modern enterprises handle the growing complexities of unregulated software use, the …
…
continue reading

1
Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here. Live from ThreatLocker’s Zero Trust World (ZTW), cybersecurity heavyweights Dave Bittner, host of CyberWire Daily and Dr. Chase Cunningham AKA Dr. Zero Trust shared their unfiltered thoughts on the state of cybersecurity, AI, and government regulations. From…
…
continue reading

1
Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals
3:20
3:20
Play later
Play later
Lists
Like
Liked
3:20New intelligence: Silk Typhoon, formerly tracked as HAFNIUM, is a China-based threat actor most recently observed targeting IT supply chains in the US. Today, we released a new report in conjunction with the Department of Justice's action against twelve Chinese nationals that includes mercenary hackers, law enforcement officers, and employees of a …
…
continue reading

1
Predicting the year of cybersecurity ahead (minus regulations)
1:02:52
1:02:52
Play later
Play later
Lists
Like
Liked
1:02:52It’s mid-February, but somehow, we’ve already been through what feels like a year's worth of change in the cybersecurity and regulation world. Beyond the standard incidents, outages, and attacks… there have been obvious impacts that have downstream effects. Regardless of regulatory changes, which we’ll cover as those impact our space, AZT brought t…
…
continue reading

1
Kicking Off Season 4 of Adoption Zero Trust (AZT)
22:43
22:43
Play later
Play later
Lists
Like
Liked
22:43Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here. Neal and I are excited to welcome you back to AZT as we kick off our fourth season. After four years of trying out different formats and episodes, including at least an entire season terrorizing vendors for slapping Zero Trust on their box as if it were some…
…
continue reading

1
The key to growing a cybersecurity career are soft skills
50:38
50:38
Play later
Play later
Lists
Like
Liked
50:38In this episode of 'Adopting Zero Trust (AZT)', host Neal Dennis and producer Elliot Volkman delve into the often-overlooked realm of soft or 'non-tech' skills in cybersecurity. This week, we chat with Courtney Hans, VP of Cyber Services at AmTrust Financial Services, and Evgeniy Kharam, author of Architecting Success: The Art of Soft Skills, who h…
…
continue reading

1
Behind the scenes of cybersecurity media and reporting
1:04:53
1:04:53
Play later
Play later
Lists
Like
Liked
1:04:53Season 3, Episode 15: We gather a panel of journalists, communications, and a researcher to discuss how cybersecurity news and incidents are reported. You can read the show notes here. In the world of cybersecurity journalism, you can broadly divide it into four competing forces: reporters, communications teams, researchers, and readers. Each requi…
…
continue reading

1
GRC tool or spreadsheets, that is the question | GRC Uncensored Preview
43:13
43:13
Play later
Play later
Lists
Like
Liked
43:13In our final preview episode of GRC Uncensored, we explore a particularly bipolar debate: do you need a GRC tool to manage compliance, or will spreadsheets suffice? After this, we will be back to our regularly produced AZT episodes. The last episodes of our pilot for GRC Uncensored can be found on your favorite podcast app or newsletter on Substack…
…
continue reading

1
Podcast Preview: GRC Uncensored and the commoditization of compliance
41:30
41:30
Play later
Play later
Lists
Like
Liked
41:30We are interrupting our regularly scheduled podcast series to introduce you to a new series we developed: GRC Uncensored. This pilot season will elevate conversations about GRC that are often buried under millions of dollars in marketing spend. No boring talks about controls or frameworks, just unfiltered discussions with auditors and practitioners…
…
continue reading

1
How to prepare your operations team for Zero Trust
46:17
46:17
Play later
Play later
Lists
Like
Liked
46:17Welcome back to Adopting Zero Trust! In this episode, hosts Elliot Volkman and Neal Dennis are joined by Rob Allen, Chief Product Officer of ThreatLocker, to dive deep into the operationalization of Zero Trust. Despite covering various aspects over three seasons, this crucial topic is addressed thoroughly. They explore pre-adoption preparation, ali…
…
continue reading

1
Log4j Continues to act as Organizational Vulnerability
47:56
47:56
Play later
Play later
Lists
Like
Liked
47:56Season 3, Episode 13: Cato Network’s Etay Maor provides fresh research on the abuse of unpatched log4j libraries. Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here. This week on Adopting Zero Trust (AZT), we highlight a significant cybersecurity risk focused on the notorious Log4j vulnerability and the growi…
…
continue reading

1
Overturning of Chevron Deference’s Impact on Cybersecurity Regulation
51:44
51:44
Play later
Play later
Lists
Like
Liked
51:44Season 3, Episode 12: Could the overturning of Chevron Deference impact cybersecurity and privacy regulations? Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here. Welcome back to Adopting Zero Trust or AZT. In our latest episode, we assembled a distinguished panel to dig into a timely topic affecting the cybe…
…
continue reading

1
Applying Vulnerability Management to Zero Trust
45:43
45:43
Play later
Play later
Lists
Like
Liked
45:43Season 3, Episode 11: Vulnerability management is critical to any Zero Trust strategy, but you probably already know that. Fortra’s Tyler Reguly breaks down severity vs. risk. Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here. Every organization relies on some form of technology to run, and each tool you add…
…
continue reading

1
The Unstoppable Phish: A Discussion with Vivek Ramachandran
26:31
26:31
Play later
Play later
Lists
Like
Liked
26:31Season 3, Episode 10: Elliot chat’s with Vivek Ramachandran of SquareX about his approach to tackling the impossible: Social engineering. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. For nearly three decades, social engineering, particularly phishing, has been one of the most impactful and fina…
…
continue reading

1
Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall
46:22
46:22
Play later
Play later
Lists
Like
Liked
46:22Season 3, Episode 9: We chat with SonicWall’s Doug McKee about the top 5 threats targeting SMBs based on recent research. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. Cybersecurity challenges come in many different flavors regardless of how old your company is or how many employees it houses. L…
…
continue reading

1
Decoding Emerging Threats: MITRE, OWASP, and Threat Intel
25:00
25:00
Play later
Play later
Lists
Like
Liked
25:00Season 3, Episode 8: AZT and Dr. Zero Trust have a crossover episode where we chat with reps from MITRE and OWASP about challenges associated with emerging threats. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. Every few weeks, and occasionally every few days, we hear report of a new novel techn…
…
continue reading

1
Navigating the Ever-Changing Landscape of Cybersecurity Regulations With Lacework and Drata
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10Season 3, Episode 7: Though regulation impacting cybersecurity moves slow, when new laws are introduced it often puts significant strain on companies. Lacework’s Tim Chase and Drata’s Matt HIllary discuss navigating the latest broad-sweeping regulations. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes h…
…
continue reading
Season 3, Episode 6: Two seasoned cybersecurity professionals, Bryan Willett and Kris Lovejoy, shed light on the dilemma organizations face when hit by ransomware: Should they pay the ransom or not? Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. Ransomware: To Pay or Not to Pay? It’s an easy ques…
…
continue reading

1
Cyber Insurance: Sexy? No. Important? Critically yes.
1:14
1:14
Play later
Play later
Lists
Like
Liked
1:14Season 3, Episode 5: Cyber Insurance may not be the sexiest topic, but it’s an important piece of any mature cyber program. We chatted with a lawyer and a VC who share their perspective. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. There are many aspects of cybersecurity that are not classified…
…
continue reading

1
The Current and Future State of Zero Trust With Forrester’s David Holmes
54:05
54:05
Play later
Play later
Lists
Like
Liked
54:05Season 3, Episode 4: Forrester Principal Research Analyst on Zero Trust, David Holmes, shares his perspective on the current and future state of Zero Trust. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. Zero Trust is a concept, a strategy, a philosophy, and, for some poor souls, a solution you c…
…
continue reading

1
Canva's Kane Narraway on Building a Zero Trust MVP
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10Season 3, Episode 3: Canva’s Head of Enterprise Security, Kane Narraway, discusses how to deploy a Zero Trust strategy in under a year. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. This week on Adopting Zero Trust (AZT) we chat with Kane Narraway, the head of Head of Enterprise Security at Canv…
…
continue reading
Season 3, Episode 2: In our conversation with Energy Solution’s CIO David Weisong we chat about how new processes, technology, and budgets are formed. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. It’s a mystery as old as time: the cybersecurity and technology budget and acquisition strategy. Ho…
…
continue reading

1
Hacker Valley Dishes on Breaking Into Cybersecurity
49:49
49:49
Play later
Play later
Lists
Like
Liked
49:49To start the new season, we are joined by Hacker Valley Media’s Ron Eddings and Chris Cochran, who discuss breaking into cybersecurity and the role storytelling plays. A new year, a new season, and plenty of new threats to impact the world of cybersecurity. This week we break from our typical conversations about modern cybersecurity strategies and …
…
continue reading

1
From Hacktivist to White Hat Hacker. A Chat with LulzSec’s Sabu.
56:18
56:18
Play later
Play later
Lists
Like
Liked
56:18Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. PS, we're giving away a Flipper Zero on our site as a little season finale gift. Check out details on our site. You know what they say, you save the best for last. As we wrap season two of Adopting Zero Trust, we take a shift from our standard conver…
…
continue reading

1
The Market For Enterprise (Secure) Browsers
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10Season two, episode 18: Evgeniy Kharam, a founder, CISO, architect, and podcast producer discusses the rise of Enterprise (Secure) browsers. You can read the show notes here and subscribe to updates. In the latest episode of AZT, Evgeniy Kharam, a founder, CISO, architect, and podcast producer, joins the discussion to talk about the rise of Enterpr…
…
continue reading

1
Beyond the Buzzword: Applicable use of AI in Cybersecurity
56:37
56:37
Play later
Play later
Lists
Like
Liked
56:37Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. The word AI, much like Zero Trust, has come with a lot of baggage in the past few years. It’s a term that’s been misused, slapped on the front of startups’ overpriced booths at RSA and Black Hat, and it feels like every cybersecurity product under th…
…
continue reading

1
AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices
54:57
54:57
Play later
Play later
Lists
Like
Liked
54:57Season two, episode 16: Zack Butcher discusses building upon NIST’s Zero Trust policies and standards, and ZT’s influence on a service mesh as it relates to microservices. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. There are several guiding concepts that make it easier for organizations to bu…
…
continue reading

1
AZT: API Security with John Kindervag, Chase Cunningham, and Richard Bird
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12Season two, episode 15: We talk ZT History and API security with the godfather of Zero Trust, Dr Zero Trust, and Richard Bird. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. In the past few years, supply chain attacks and their impacts have or will soon overtake that of the damage done by ransomw…
…
continue reading

1
Adopting Zero Trust: The Illusion of Passwordless
51:25
51:25
Play later
Play later
Lists
Like
Liked
51:25The illusion of going passwordless with Derek Hanson, Vice President Solutions Architecture and Alliances at Yubico. You can read the show notes here. True or False: The concept of passwordless is new. False. This is shocking, we know. Considering the amount of hype around the concept, it certainly can feel like a new concept since the masses are b…
…
continue reading

1
Adopting Zero Trust: Philosophy of Prevention with iHeartMedia’s Janet Heins
44:02
44:02
Play later
Play later
Lists
Like
Liked
44:02Season two, episode 13: Cybersecurity prevention on a global scale with Janey Heins, Global CISO for iHeartMedia. At the heart of Zero Trust is the idea of prevention. If you don’t trust anything or any person, you are playing in the same pool as risk avoidance. While total risk avoidance isn’t feasible, Zero Trust gets us closer to reality. Now, m…
…
continue reading
Over the past two years, we’ve explored the ins and outs of Zero Trust, ranging from the concept as a strategy down to the more technical components, such as how it impacts the physical world as found in IoT devices. However, what is often missed in these conversations, is at what point an organization can actually build trust. Not just crawling up…
…
continue reading
Last episode, we brought to you a wild story of a victim who was SIM-swapped four times, and this week we’re back to basics with some fresh research and a closer look at a critical piece of Zero Trust: Non-federated applications. Cerby’s Chief Trust Officer, Matt Chiodi, was kind enough to add a bit of color to a research report they released at RS…
…
continue reading
Taking a break from our usual format, this week we chat with a victim-turned-CEO who was hit by SIM-swapping attacks. However, not all harsh starts have to end that way, and Haseeb Awan made the best of a bad situation. After being compromised not once… nor twice, but four times, Haseeb eventually took matters into his own hands and developed a new…
…
continue reading

1
Adopting Zero Trust with Bloomberg: Implemented
51:49
51:49
Play later
Play later
Lists
Like
Liked
51:49Season two, episode nine: Featuring Bloomberg’s Head of Information Security Architecture and the Information Security Program, Phil Vachon. Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. What does implementing a Zero Trust strategy actually look like in an organization? Nearly a year into our po…
…
continue reading

1
Adopting Zero Trust with Bitwarden: The Mighty Password
54:32
54:32
Play later
Play later
Lists
Like
Liked
54:32There’s no avoiding it, the headlines have not been kind to the ways we access systems today. Users are still using 1234, password, and even their dog's name. Not just using these weak passwords but also reusing them across multiple platforms, making it incredibly easy to breach someone once they’ve been caught up in a previous breach. On the vendo…
…
continue reading

1
Adopting Zero Trust: Empathetic Leadership with Kyndryl’s Kris Lovejoy
57:45
57:45
Play later
Play later
Lists
Like
Liked
57:45For many, cybersecurity is seen as a cost center that reduces risk to the business. This can be oversimplified to something akin to how HR reduces people-related risks but comes with layer on top of layer of complexities ranging from technology to physical buildings and, of course, people. Regardless of organizational size, cybersecurity leadership…
…
continue reading

1
Adopting Zero Trust: Cybersecurity Innovation with Stanford Fellow AJ Grotto
39:14
39:14
Play later
Play later
Lists
Like
Liked
39:14For more than a decade, Zero Trust as a concept has moved from a philosophy and now into a practical architecture and strategy that organizations can adopt. While Zero Trust encapsulates much of what has gone well in cybersecurity for the past 30 years or so, does it truly offer an innovative approach or just iterative change? Is the concept positi…
…
continue reading
This week on AZT, we chat about something timely and impactful to everyone in the cybersecurity and users impacted by related decisions: the new National Cybersecurity Strategy (full strategy here). Our guests this week are Tony Scott and Ilona Cohen, both industry powerhouses and experts well-equipped to navigate this complex document. Ilona Cohen…
…
continue reading
This week Neal and I continue with our exploration of new formats, and this time we go one-on-one with the Founder and CEO of Netfoundry, Galeal Zino. Prior to Netfoundry, Zino spent much of his career traversing R&D, and later moving into a key role for Tata Communications. Though Netfoundry’s bread and butter is a Zero Trust Network Access (ZTNA)…
…
continue reading

1
Adopting Zero Trust with Author George Finney: Approachable
50:43
50:43
Play later
Play later
Lists
Like
Liked
50:43Zero Trust as a concept or strategy on the surface appears simple in nature. Heck, it’s only two words. However, when push comes to shove, and it’s time for organizational adoption, Zero Trust impacts every aspect of a business in the form of a digital transformation. Fortunately, for every complexity and question, there is an answer and solution, …
…
continue reading

1
Adopting Zero Trust: Zero Knowledge Authority
48:50
48:50
Play later
Play later
Lists
Like
Liked
48:50This week we have a two-for-one special and feature our newest panel-style format. On the practitioner side, we have crowd favorite Andrew Abel, who currently works with a financial institution, but has worked across multiple other industries in the past. On the Zero Trust technology side, we have Michael Loewy, Co-Founder of Tide Foundation. Tide …
…
continue reading

1
Adopting Zero Trust With Ismael Valenzuela: Less Trust
48:47
48:47
Play later
Play later
Lists
Like
Liked
48:47This week we chat with Ismael Valenzuela, VP of Threat Intel at Blackberry, a 13-year SANS instructor, and has balanced his time between educator and practitioner for decades. Before peppering Ismael with our usual questions and falling down the rabbit hole, we dug a bit deeper into his background and what drives him to split his time between educa…
…
continue reading

1
Adopting Zero Trust: Season One is Wrapped
49:52
49:52
Play later
Play later
Lists
Like
Liked
49:52Welcome to the last episode of season one, where Neal and I go on a rambling adventure and look back on some of the interesting and eye-opening conversations we’ve had over the past few months. To wrap things up, and what was supposed to be a 20-minute conversation, we felt it was time to better introduce ourselves to our listeners, discuss some pl…
…
continue reading

1
Adopting Zero Trust with Chase Cunningham: The Doctor is in
56:17
56:17
Play later
Play later
Lists
Like
Liked
56:17This week we chat with Chase Cunningham, Doctor Zero Trust himself, about the decade-overnight success of Zero Trust, how he got involved with the concept, and methods for navigating vendors wanting to shape the concept. For those initiated into the world of Zero Trust, you are no doubt familiar with his podcast, regular LinkedIn musings, and histo…
…
continue reading

1
Adopting Zero Trust with Chris Reinhold: Pen Testing Zero Trust
46:18
46:18
Play later
Play later
Lists
Like
Liked
46:18This week we chatted with Chris Reinhold, Director of Innovation at Core BTS, a managed security service provider (MSSP) and IT consulting firm. We dig into the long-awaited answer to our previous call, pen testing Zero Trust systems. Plus, we chat about the idea of Zero Trust as a certification and the always relevant factoid that compliance is no…
…
continue reading