
Sign up to save your podcasts
Or


Zero trust is a cybersecurity first principle strategy. Key to deploying a robust program is the Identity and Access Management tactic (IAM). The old perimeter defense model, designed in the 1990s, where network architects allowed good guys (and bad guys) through the perimeter to validate IAM policy seems ridiculous in hindsight. The new model, Software Defined Perimeter (SDP), is not as well known but is probably a better design. In this episode, Rick Howard discusses the history and current state.
Learn more about your ad choices. Visit megaphone.fm/adchoices
By N2K Networks5
1515 ratings
Zero trust is a cybersecurity first principle strategy. Key to deploying a robust program is the Identity and Access Management tactic (IAM). The old perimeter defense model, designed in the 1990s, where network architects allowed good guys (and bad guys) through the perimeter to validate IAM policy seems ridiculous in hindsight. The new model, Software Defined Perimeter (SDP), is not as well known but is probably a better design. In this episode, Rick Howard discusses the history and current state.
Learn more about your ad choices. Visit megaphone.fm/adchoices

4,385 Listeners

649 Listeners

1,032 Listeners

113,041 Listeners

8,090 Listeners

74 Listeners

5,559 Listeners

3,501 Listeners

1,444 Listeners