{"href":"http://player.captivate.fm/services/oembed?url=http%3A%2F%2Fplayer.captivate.fm%2Fepisode%2Fda6c3343-58e3-47ea-b5ca-e9fe3899417c","version":"1.0","provider_name":"Captivate.FM","provider_url":"https://www.captivate.fm","width":600,"height":200,"type":"rich","html":"<iframe style=\"width: 100%; height: 200px;\" title=\"13. Fundamentals of Zero Trust Principles\" frameborder=\"0\" scrolling=\"no\" allow=\"clipboard-write\" seamless src=\"http://player.captivate.fm/episode/da6c3343-58e3-47ea-b5ca-e9fe3899417c\"></iframe>","title":"13. Fundamentals of Zero Trust Principles","description":"How can anyone manage their security when so much is literally out of their control within a 3rd party SaaS or BYOD?\u00a0 A breach is going to happen so limit the impact using Zero Trust principles:\u00a0  Focus on the Data Trust no user\u00a0 Trust no communication Deny access by default and provide minimal access when required\u00a0\u00a0  Consulting Senior Product Marketing Manager at Infoblox, Michael Zuckerman, joins Threat Talk to discuss Zero Trust in detail.\u00a0 Designed with Data at the heart of the protection strategy, Zero Trust uses fundamental IT technology such as DNS filtering, encryption and microsegmentation as key components to control access and limit exposure. You can find this interview, and many more, by subscribing to the ThreatTalk podcast on  Apple Podcasts or on  Spotify.","thumbnail_width":300,"thumbnail_height":300,"thumbnail_url":"https://artwork.captivate.fm/bd973a02-916e-4bd2-8067-f23321f0278d/infoblox-logo-square-big.jpg"}