Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Adopting Zero Trust

Technology

Activity Overview

Episode publication activity over the past year

Episodes

Whisper Leak: How Encrypted AI Chats Still Leak Conversation Topics

11 Dec 2025

Contributed by Lukas

In this episode, we break down Whisper Leak, a newly disclosed side-channel issue affecting encrypted LLM communications. JBO explains how attackers c...

How Critical Infrastructure Leaders Are Rethinking Cybersecurity

17 Apr 2025

Contributed by Lukas

In this episode of Adopting Zero Trust, hosts Elliot Volkman and Neal Dennis discuss critical infrastructure security with expert guest Ian Branson, V...

Shadows Within Shadows: How AI is Challenging IT Teams

20 Mar 2025

Contributed by Lukas

In this episode of Adoption Zero Trust (AZT), host Neal Dennis and producer Elliot Volkman sit down with Bradon Rogers, Chief Customer Officer at Isla...

Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust

06 Mar 2025

Contributed by Lukas

Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here. Live from ThreatLocker’s Zero Trust World (ZTW), cyberse...

Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals

05 Mar 2025

Contributed by Lukas

New intelligence: Silk Typhoon, formerly tracked as HAFNIUM, is a China-based threat actor most recently observed targeting IT supply ch...

Predicting the year of cybersecurity ahead (minus regulations)

18 Feb 2025

Contributed by Lukas

It’s mid-February, but somehow, we’ve already been through what feels like a year's worth of change in the cybersecurity and regulation world. Bey...

Kicking Off Season 4 of Adoption Zero Trust (AZT)

11 Feb 2025

Contributed by Lukas

Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here. Neal and I are excited to welcome you back to AZT as we ki...

The key to growing a cybersecurity career are soft skills

19 Dec 2024

Contributed by Lukas

In this episode of 'Adopting Zero Trust (AZT)', host Neal Dennis and producer Elliot Volkman delve into the often-overlooked realm of soft or 'non-tec...

Behind the scenes of cybersecurity media and reporting

21 Nov 2024

Contributed by Lukas

Season 3, Episode 15: We gather a panel of journalists, communications, and a researcher to discuss how cybersecurity news and incidents are reported....

GRC tool or spreadsheets, that is the question | GRC Uncensored Preview

24 Oct 2024

Contributed by Lukas

In our final preview episode of GRC Uncensored, we explore a particularly bipolar debate: do you need a GRC tool to manage compliance, or will spreads...

Podcast Preview: GRC Uncensored and the commoditization of compliance

10 Oct 2024

Contributed by Lukas

We are interrupting our regularly scheduled podcast series to introduce you to a new series we developed: GRC Uncensored. This pilot season will eleva...

How to prepare your operations team for Zero Trust

26 Sep 2024

Contributed by Lukas

Welcome back to Adopting Zero Trust! In this episode, hosts Elliot Volkman and Neal Dennis are joined by Rob Allen, Chief Product Officer of ThreatLoc...

Log4j Continues to act as Organizational Vulnerability

05 Sep 2024

Contributed by Lukas

Season 3, Episode 13: Cato Network’s Etay Maor provides fresh research on the abuse of unpatched log4j libraries. Catch this episode on YouTube, A...

Overturning of Chevron Deference’s Impact on Cybersecurity Regulation

20 Aug 2024

Contributed by Lukas

Season 3, Episode 12: Could the overturning of Chevron Deference impact cybersecurity and privacy regulations? Catch this episode on YouTube, Apple,...

Applying Vulnerability Management to Zero Trust

01 Aug 2024

Contributed by Lukas

Season 3, Episode 11: Vulnerability management is critical to any Zero Trust strategy, but you probably already know that. Fortra’s Tyler Reguly bre...

The Unstoppable Phish: A Discussion with Vivek Ramachandran

02 Jul 2024

Contributed by Lukas

Season 3, Episode 10: Elliot chat’s with Vivek Ramachandran of SquareX about his approach to tackling the impossible: Social engineering. Catch this...

Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall

13 Jun 2024

Contributed by Lukas

Season 3, Episode 9: We chat with SonicWall’s Doug McKee about the top 5 threats targeting SMBs based on recent research. Catch this episode on You...

Decoding Emerging Threats: MITRE, OWASP, and Threat Intel

06 Jun 2024

Contributed by Lukas

Season 3, Episode 8: AZT and Dr. Zero Trust have a crossover episode where we chat with reps from MITRE and OWASP about challenges associated with eme...

Navigating the Ever-Changing Landscape of Cybersecurity Regulations With Lacework and Drata

30 May 2024

Contributed by Lukas

Season 3, Episode 7: Though regulation impacting cybersecurity moves slow, when new laws are introduced it often puts significant strain on companies....

Ransomware: To Pay or Not to Pay?

30 Apr 2024

Contributed by Lukas

Season 3, Episode 6: Two seasoned cybersecurity professionals, Bryan Willett and Kris Lovejoy, shed light on the dilemma organizations face when hit b...

Cyber Insurance: Sexy? No. Important? Critically yes.

11 Apr 2024

Contributed by Lukas

Season 3, Episode 5: Cyber Insurance may not be the sexiest topic, but it’s an important piece of any mature cyber program. We chatted with a lawyer...

The Current and Future State of Zero Trust With Forrester’s David Holmes

28 Mar 2024

Contributed by Lukas

Season 3, Episode 4: Forrester Principal Research Analyst on Zero Trust, David Holmes, shares his perspective on the current and future state of Zero ...

Canva's Kane Narraway on Building a Zero Trust MVP

07 Mar 2024

Contributed by Lukas

Season 3, Episode 3: Canva’s Head of Enterprise Security, Kane Narraway, discusses how to deploy a Zero Trust strategy in under a year. Catch this e...

AZT: Quit Bugging the CISO + CIO

08 Feb 2024

Contributed by Lukas

Season 3, Episode 2: In our conversation with Energy Solution’s CIO David Weisong we chat about how new processes, technology, and budgets are forme...

Hacker Valley Dishes on Breaking Into Cybersecurity

18 Jan 2024

Contributed by Lukas

To start the new season, we are joined by Hacker Valley Media’s Ron Eddings and Chris Cochran, who discuss breaking into cybersecurity and the role ...

From Hacktivist to White Hat Hacker. A Chat with LulzSec’s Sabu.

30 Nov 2023

Contributed by Lukas

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. PS, we're giving away a Flipper Zero on our ...

The Market For Enterprise (Secure) Browsers

16 Nov 2023

Contributed by Lukas

Season two, episode 18: Evgeniy Kharam, a founder, CISO, architect, and podcast producer discusses the rise of Enterprise (Secure) browsers. You can r...

Beyond the Buzzword: Applicable use of AI in Cybersecurity

02 Nov 2023

Contributed by Lukas

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.   The word AI, much like Zero Trust, has co...

AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices

19 Oct 2023

Contributed by Lukas

Season two, episode 16: Zack Butcher discusses building upon NIST’s Zero Trust policies and standards, and ZT’s influence on a service mesh as it ...

AZT: API Security with John Kindervag, Chase Cunningham, and Richard Bird

31 Aug 2023

Contributed by Lukas

Season two, episode 15: We talk ZT History and API security with the godfather of Zero Trust, Dr Zero Trust, and Richard Bird. Catch this episode on ...

Adopting Zero Trust: The Illusion of Passwordless

10 Aug 2023

Contributed by Lukas

The illusion of going passwordless with Derek Hanson, Vice President Solutions Architecture and Alliances at Yubico. You can read the show notes here....

Adopting Zero Trust: Philosophy of Prevention with iHeartMedia’s Janet Heins

27 Jul 2023

Contributed by Lukas

Season two, episode 13: Cybersecurity prevention on a global scale with Janey Heins, Global CISO for iHeartMedia.   At the heart of Zero Trust is the...

Adopting Zero Trust: Continuous Trust

13 Jul 2023

Contributed by Lukas

Over the past two years, we’ve explored the ins and outs of Zero Trust, ranging from the concept as a strategy down to the more technical components...

Adopting Zero Trust: Nonfederated Apps

29 Jun 2023

Contributed by Lukas

Last episode, we brought to you a wild story of a victim who was SIM-swapped four times, and this week we’re back to basics with some fresh research...

Adopting Zero Trust: SIM Swapped

15 Jun 2023

Contributed by Lukas

Taking a break from our usual format, this week we chat with a victim-turned-CEO who was hit by SIM-swapping attacks. However, not all harsh starts ha...

Adopting Zero Trust with Bloomberg: Implemented

25 May 2023

Contributed by Lukas

Season two, episode nine: Featuring Bloomberg’s Head of Information Security Architecture and the Information Security Program, Phil Vachon.   Catc...

Adopting Zero Trust with Bitwarden: The Mighty Password

11 May 2023

Contributed by Lukas

There’s no avoiding it, the headlines have not been kind to the ways we access systems today. Users are still using 1234, password, and even their d...

Adopting Zero Trust: Empathetic Leadership with Kyndryl’s Kris Lovejoy

27 Apr 2023

Contributed by Lukas

For many, cybersecurity is seen as a cost center that reduces risk to the business. This can be oversimplified to something akin to how HR reduces peo...

Adopting Zero Trust: Cybersecurity Innovation with Stanford Fellow AJ Grotto

13 Apr 2023

Contributed by Lukas

For more than a decade, Zero Trust as a concept has moved from a philosophy and now into a practical architecture and strategy that organizations can ...

AZT: The National Cybersecurity Strategy

23 Mar 2023

Contributed by Lukas

This week on AZT, we chat about something timely and impactful to everyone in the cybersecurity and users impacted by related decisions: the new Natio...

Adopting Zero Trust: Open Source

09 Mar 2023

Contributed by Lukas

This week Neal and I continue with our exploration of new formats, and this time we go one-on-one with the Founder and CEO of Netfoundry, Galeal Zino....

Adopting Zero Trust with Author George Finney: Approachable

23 Feb 2023

Contributed by Lukas

Zero Trust as a concept or strategy on the surface appears simple in nature. Heck, it’s only two words. However, when push comes to shove, and it’...

Adopting Zero Trust: Zero Knowledge Authority

10 Feb 2023

Contributed by Lukas

This week we have a two-for-one special and feature our newest panel-style format. On the practitioner side, we have crowd favorite Andrew Abel, who c...

Adopting Zero Trust With Ismael Valenzuela: Less Trust

26 Jan 2023

Contributed by Lukas

This week we chat with Ismael Valenzuela, VP of Threat Intel at Blackberry, a 13-year SANS instructor, and has balanced his time between educator and ...

Adopting Zero Trust: Season One is Wrapped

15 Dec 2022

Contributed by Lukas

Welcome to the last episode of season one, where Neal and I go on a rambling adventure and look back on some of the interesting and eye-opening conver...

Adopting Zero Trust with Chase Cunningham: The Doctor is in

22 Nov 2022

Contributed by Lukas

This week we chat with Chase Cunningham, Doctor Zero Trust himself, about the decade-overnight success of Zero Trust, how he got involved with the con...

Adopting Zero Trust with Chris Reinhold: Pen Testing Zero Trust

10 Nov 2022

Contributed by Lukas

This week we chatted with Chris Reinhold, Director of Innovation at Core BTS, a managed security service provider (MSSP) and IT consulting firm. We di...

Adopting Zero Trust with J. R. Cunningham: The Moat Has Dried Up

20 Oct 2022

Contributed by Lukas

This week we chat with J. R. Cunningham, Chief Security Officer at Nuspire, and we dig into Zero Trust as a journey. Nuspire is a managed security ser...

Adopting Zero Trust With Maureen Rosado: Selling Zero Trust

06 Oct 2022

Contributed by Lukas

This week we chat with Maureen Rosado, a Zero Trust Strategist for BT, who has an outstanding history of business development for enterprise companies...

Adopting Zero Trust with Christine Owen: Searching For the Finish Line

22 Sep 2022

Contributed by Lukas

This week we chat with Christine Owen, Director at Guidehouse, and we dig into Zero Trust as an approach to harden your identity and access management...

Adopting Zero Trust with Lexmark’s Bryan Willett: Culture of Security

08 Sep 2022

Contributed by Lukas

This week we chat with Bryan Willett, Lexmark’s CISO, who has built a legacy over the past 25 years working for the global company. Starting from hi...

Adopting Zero Trust with Dom Glavach: Staffing Up

25 Aug 2022

Contributed by Lukas

This week we chat with Dom Glavach, Chief Security Officer (CSO) of CyberSN (Cyber Security Network) and a security consultant, and we dig into Zero T...

Adopting Zero Trust With Nicolas Chaillan: From Policy to DHS

11 Aug 2022

Contributed by Lukas

Nicolas Chaillan is an Entrepreneur who became a US citizen about six years ago, and immediately joined the DHS where he became the chief architect an...

Adopting Zero Trust with Ryan Alford: IoT Secured

27 Jul 2022

Contributed by Lukas

This week we chat with Ryan Alford, Founder and CEO of Engineering Design Group (EDG), and we dig into how Zero Trust impacts the future of hardware, ...

Adopting Zero Trust With Andrew Abel: Translating Zero Trust Into Business Concepts

14 Jul 2022

Contributed by Lukas

This week we chat with Andrew Abel, our defacto Zero Trust expert who is currently the EUC Cyber Security Strategy and Architecture Lead for an energy...

Adopting Zero Trust, Episode Zero: Let’s Make a Podcast

07 Jul 2022

Contributed by Lukas

Today, Zero Trust is a fuzzy term with more than a dozen different definitions. Threat Analyst Neal Dennis and Cybersecurity Journalist Elliot Volkman...

Introducing Adopting Zero Trust

07 Jul 2022

Contributed by Lukas

Today, Zero Trust is a fuzzy term with more than a dozen different definitions. We are on a mission to give a voice to cybersecurity practitioners and...