article thumbnail

Zero Trust Network Architecture vs Zero Trust: What Is the Difference?

Joseph Steinberg

But, even those who have a decent grasp on the meaning of Zero Trust seem to frequently confuse the term with Zero Trust Network Architecture (ZTNA). Zero Trust Network Architecture is an architecture of systems, data, and workflow that implements a Zero Trust model. In short, Zero Trust is an approach.

article thumbnail

Threat Modeling and Architecture

Adam Shostack

[no description provided] " Threat Modeling and Architecture " is the latest in a series at Infosec Insider. After I wrote my last article on Rolling out a Threat Modeling Program, Shawn Chowdhury asked (on Linkedin) for more informatioin on involving threat modeling in the architecture process. Have we done a good job?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Review: Practical Cybersecurity Architecture

Adam Shostack

Adam Shostack's review of the book Practical Cybersecurity Architecture There's an insightful comment , "Everybody has a testing environment. Similarly, everybody has both enterprise and product architecture. All in all, worth your time if what you do touches architecture, and more so if you had thought architecture a dirty word.

article thumbnail

New Chaos malware spreads over multiple architectures

Tech Republic Security

A new malware named Chaos raises concerns as it spreads on multiple architectures and operating systems. The post New Chaos malware spreads over multiple architectures appeared first on TechRepublic.

article thumbnail

Threat Model Thursday: Legible Architecture

Adam Shostack

What's the legible architecture of a system? One of the advantages that cloud architectures bring is the opportunity to sweep away some of that historical complexity, and to create comprehensible models. As your threat modeling evolves, it's important to ask: what's the legible architecture of these systems? It's a tool.

article thumbnail

The Foundation of Zero-Trust Security Architecture

Security Boulevard

For today’s IT organizations, establishing a zero-trust (ZT) architecture is an ongoing process of refinements for existing networks, resources, methods and security capabilities. The post The Foundation of Zero-Trust Security Architecture appeared first on Security Boulevard.

article thumbnail

Threat Model Thursday: Architectural Review and Threat Modeling

Adam Shostack

[no description provided] For Threat Model Thursday, I want to use current events here in Seattle as a prism through which we can look at technology architecture review. Let's transition from the housing crisis here in Seattle to the architecture crisis that we face in technology. Seattle has a housing and homelessness crisis.