VentureBeat Special Issue — Zero trust: The new security paradigm

November 15, 2022

Zero trust: The new security paradigm

Presented with PwC

In the ‘80s hit cop drama, Hill Street Blues, sergeant Phil Esterhaus ended every daily roll call with, “Let’s be careful out there.” Fast-forward a few decades, and that mantra is one CISOs should use to lead their teams.

Today’s hybrid workforce, hybrid cloud, ransomware-infused world makes it imperative for teams to take extra caution. In short, trust no one, authenticate everyone. That’s where zero trust comes in. More than a single product, zero trust is a framework built to ensure that everyone is identified, authorized and authenticated before they access your applications and data. In a zero-trust environment, the network edge is everywhere – so that’s where security needs to be, too.

In our special report, we look at zero-trust architectures from all angles, including why companies are getting it wrong. We also dig into Kubernetes deployments, endpoint security and multicloud and supply chain management. We hope you find both strategic and tactical guidance in our special report. And, yes, be careful out there.

Dan Muse
Managing Editor and Content Director

Why Kubernetes security challenges call for a zero-trust strategy

Victor Dey

The Kubernetes community and service mesh providers are linking arms toward standardizing on zero-trust security.


4 How Zero Trust Is Aiding Security Challenges In Kubernetes
3 Moving From Zero Trust To Zero Trust Network Access 2.0

Zero trust is too trusting, why ZTNA 2.0 won’t be

Tim Keary

ZTNA 2.0 applies least privileged access and implements continuous trust verification, monitoring user and app behavior.


Why zero trust needs to live on the edge

Louis Columbus

Baking in zero-trust architecture can help secure edge computing and IoT in the cloud.


9 Why Edge Computing Needs Zero Trust Designed In

Join the VentureBeat Community

Connect with VentureBeat