Nicholas Seeley shares his thoughts on zero-trust cybersecurity and the idea that trust actually underpins all security. He argues when applying zero trust to a network, security professionals should continually evaluate what they trust, why they trust it, and when they should no longer trust it.
Contribute to the conversation
We want to hear from you. Send us your questions, thoughts on ICS and OT cybersecurity, and ideas for what we should discuss next.
Learn what cybersecurity professionals must consider when working to minimize attack surfaces.
Learn how the CIA triad informs how to apply cryptography to operational technology (OT) networks.
Discover why deny-by-default technology is one of the strongest ways to design secure communications paths for operational technology (OT) networks.