Artwork

Content provided by CyberSecurity Summary. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CyberSecurity Summary or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Zero Trust in Resilient Cloud and Network Architectures (Networking Technology)

26:15
 
Share
 

Manage episode 503298471 series 3683458
Content provided by CyberSecurity Summary. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CyberSecurity Summary or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Offers an in-depth look at implementing zero trust architectures in modern IT environments, encompassing on-premises, cloud, and hybrid infrastructures. It covers various aspects, including network automation, secure development lifecycles, and advanced security concepts like AI/ML-driven threat detection and quantum-safe cryptography. The text emphasizes the importance of segmentation, identity and access management (IAM), and continuous monitoring to protect data and systems. Practical examples and case studies, such as the Fast Burger network implementation, illustrate real-world applications and best practices for achieving robust security postures.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Resilient-Network-Architectures-Networking-Technology/dp/0138204608?&linkCode=ll1&tag=cvthunderx-20&linkId=86a9b195e265db68b1b190ff66a4c4e7&language=en_US&ref_=as_li_ss_tl
  continue reading

993 episodes

Artwork
iconShare
 
Manage episode 503298471 series 3683458
Content provided by CyberSecurity Summary. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CyberSecurity Summary or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Offers an in-depth look at implementing zero trust architectures in modern IT environments, encompassing on-premises, cloud, and hybrid infrastructures. It covers various aspects, including network automation, secure development lifecycles, and advanced security concepts like AI/ML-driven threat detection and quantum-safe cryptography. The text emphasizes the importance of segmentation, identity and access management (IAM), and continuous monitoring to protect data and systems. Practical examples and case studies, such as the Fast Burger network implementation, illustrate real-world applications and best practices for achieving robust security postures.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Resilient-Network-Architectures-Networking-Technology/dp/0138204608?&linkCode=ll1&tag=cvthunderx-20&linkId=86a9b195e265db68b1b190ff66a4c4e7&language=en_US&ref_=as_li_ss_tl
  continue reading

993 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play