{"version":1,"type":"rich","provider_name":"Libsyn","provider_url":"https:\/\/www.libsyn.com","height":300,"width":600,"title":"The Biggest Zero Trust Architecture Gaps You Need to Fill. - CFH #16","description":"Creating a zero-trust architecture is a gradual process that starts with understanding precisely what you need to implement a \u201cnever trust, always verify\u201d approach within your extended organization. Rather than materializing all at once, organizations often develop a ZTA in phases over time. However, during this maturation process, gaps in zero-trust processes can form \u2013 creating potential weak spots. This session will look at some of the most common holes that develop in zero-trust architectures and the steps can be taken to close them. &amp;nbsp; Show Notes: https:\/\/securityweekly.com\/cfh16 ","author_name":"Cyber for Hire (Video)","author_url":"https:\/\/www.scmagazine.com\/podcast-show\/cyber-for-hire","html":"<iframe title=\"Libsyn Player\" style=\"border: none\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/26500692\/height\/300\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/88AA3C\/\" height=\"300\" width=\"600\" scrolling=\"no\"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen><\/iframe>","thumbnail_url":"https:\/\/assets.libsyn.com\/secure\/content\/149855163"}