Tag

Zero Trust Implementation

Details the principles and practical steps for adopting a zero trust security architecture. Articles cover identity verification, micro-segmentation, least-privilege access, continuous monitoring, and phased rollout strategies for organizations transitioning to zero trust.

posts

Zero Trust Implementation

Zero Trust Implementation: A Practical Guide for 2021

When Twitter disclosed in July 2020 that attackers had hijacked 130 high-profile accounts — including Barack Obama, Elon Musk, and Apple — the root cause wasn't some exotic zero-day exploit. It was social engineering. Attackers manipulated employees, gained access to internal tools, and moved laterally through systems that trusted them

Carl B. Johnson Dec 12, 2020 7 min read
Zero Trust Implementation

Zero Trust Implementation: A Practical Guide for 2026

The Breach That Proved "Trust But Verify" Is Dead In early 2024, a major healthcare provider disclosed that attackers had spent nine months inside their network — moving laterally, escalating privileges, and exfiltrating millions of patient records. Their perimeter defenses were solid. Their VPN was enterprise-grade. None of it

Carl B. Johnson Sep 28, 2019 7 min read