
Sign up to save your podcasts
Or


The breach didn't come through a broken firewall. It walked in through a valid login. Nothing exploded. Nothing looked suspicious at first. Someone just signed in and kept going.
This episode clears up what Zero Trust actually is and what it isn't. It's not a product, not a box you install, and not a technology you turn on. It's a design decision: don't automatically believe a request just because it comes from inside your network. The episode explains why the old perimeter model stopped working when work moved to laptops, apps moved to the cloud, and being "inside the network" stopped meaning anything useful about risk. It walks through the four core signals Zero Trust evaluates (identity, device health, access scope, and segmentation), explains how Zero Trust Network Access differs from traditional VPNs, and addresses common misconceptions including the idea that Zero Trust means trusting no one. The starter kit covers strong authentication, separating daily accounts from admin accounts, mapping access paths, setting device requirements, and reducing broad network access.
Whether you keep hearing "Zero Trust" in vendor pitches and want to know what it actually means or you're starting to rethink how your organization handles remote access, Plaintext with Rich cuts through the marketing.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene
By Rich GreeneThe breach didn't come through a broken firewall. It walked in through a valid login. Nothing exploded. Nothing looked suspicious at first. Someone just signed in and kept going.
This episode clears up what Zero Trust actually is and what it isn't. It's not a product, not a box you install, and not a technology you turn on. It's a design decision: don't automatically believe a request just because it comes from inside your network. The episode explains why the old perimeter model stopped working when work moved to laptops, apps moved to the cloud, and being "inside the network" stopped meaning anything useful about risk. It walks through the four core signals Zero Trust evaluates (identity, device health, access scope, and segmentation), explains how Zero Trust Network Access differs from traditional VPNs, and addresses common misconceptions including the idea that Zero Trust means trusting no one. The starter kit covers strong authentication, separating daily accounts from admin accounts, mapping access paths, setting device requirements, and reducing broad network access.
Whether you keep hearing "Zero Trust" in vendor pitches and want to know what it actually means or you're starting to rethink how your organization handles remote access, Plaintext with Rich cuts through the marketing.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene