
Sign up to save your podcasts
Or


Zero trust is a cybersecurity first principle strategy. Key to deploying a robust program is the Identity and Access Management tactic (IAM). The old perimeter defense model, designed in the 1990s, where network architects allowed good guys (and bad guys) through the perimeter to validate IAM policy seems ridiculous in hindsight. The new model, Software Defined Perimeter (SDP), is not as well known but is probably a better design. In this episode, Rick Howard discusses the history and current state.
Learn more about your ad choices. Visit megaphone.fm/adchoices
By N2K Networks5
1515 ratings
Zero trust is a cybersecurity first principle strategy. Key to deploying a robust program is the Identity and Access Management tactic (IAM). The old perimeter defense model, designed in the 1990s, where network architects allowed good guys (and bad guys) through the perimeter to validate IAM policy seems ridiculous in hindsight. The new model, Software Defined Perimeter (SDP), is not as well known but is probably a better design. In this episode, Rick Howard discusses the history and current state.
Learn more about your ad choices. Visit megaphone.fm/adchoices

4,420 Listeners

651 Listeners

1,028 Listeners

113,121 Listeners

8,077 Listeners

73 Listeners

5,576 Listeners

3,538 Listeners

1,480 Listeners