Tag

Zero Trust Network Access

Articles explaining Zero Trust Network Access principles and implementation strategies. Covers identity verification, least-privilege access, micro-segmentation, continuous authentication, and how ZTNA architectures replace traditional perimeter-based security models to protect modern distributed environments.

posts

Zero Trust Network Access

Zero Trust Network Access: A Practical Guide for 2026

In January 2024, Microsoft disclosed that a Russian-linked threat actor — Midnight Blizzard — breached corporate email accounts by exploiting a legacy test tenant that lacked multi-factor authentication. No zero-day. No sophisticated exploit chain. Just a password spray against an old account that trusted the network it sat on. That's

Carl B. Johnson Mar 30, 2026 5 min read
Zero Trust Network Access

Zero Trust Network Access: A Practical Guide for 2021

The SolarWinds Breach Just Proved Your Perimeter Is Dead As I write this in December 2020, we're watching one of the most devastating supply chain attacks in history unfold. The SolarWinds breach — disclosed just days ago — compromised U.S. government agencies and major corporations by exploiting trusted software

Carl B. Johnson Dec 12, 2020 7 min read
Zero Trust Network Access

Zero Trust Network Access: A Practical Guide for 2026

The Breach That Proved Perimeter Security Was Dead In early 2024, a threat actor gained access to Microsoft's corporate email system — including accounts belonging to senior leadership and cybersecurity staff. The attacker didn't exploit some exotic zero-day. They used a password spray attack against a legacy

Carl B. Johnson Sep 28, 2019 8 min read