

DrZeroTrust
Dr. Chase Cunningham
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPodcast #Cybersecurity #ZeroTrust
Episodes
Mentioned books

May 7, 2025 • 12min
The Dr Zero Trust Show
In this conversation, Derek Maki, head of product at Veracode, discusses the evolving landscape of application security, the impact of AI on code security, and the importance of prevention in the future of security practices. He shares insights from the RSA Conference and highlights Veracode's innovations in securing applications and managing risks in the software development lifecycle.TakeawaysVeracode has been a leader in application security since 2006.The rise of AI has not improved the security of code.Veracode's AI fix engine automates remediation of code weaknesses.Preventing malicious packages is a key focus for Veracode.Consumer security is becoming increasingly important.The RSA Conference showcases both noise and innovation in security.Seamless integration of security into developer tools is essential.Open source security is a growing area of concern.Threat intelligence can enhance security measures beyond application security.The future of security will emphasize prevention over detection.

Apr 24, 2025 • 12min
The 10ring App!
🚨 RSA Attendees, Let's Shake Things Up! 🚨Ever been frustrated that your voice isn't heard at big tech events? Me too. That's why I built 10ring—the app where YOU rate vendors, anonymously if you prefer, and help drive real transparency and accountability.No fluff. No selling your emails. Just honest feedback, community-driven rankings, and heck—I’ll even toss $100 cash daily to whoever reviews the most vendors.I put my own money where my mouth is because change doesn’t happen by accident—it happens when we speak up together.Ready to join the movement? Let's make RSA2025 unforgettable.#10ringApp #RSA2025 #TechTransparency #CyberSecurityTakeawaysThe Tenring app is designed to enhance vendor-user interactions.Users can choose to be anonymous or public while using the app.Dr. Cunningham funded the app entirely out of his own pocket.The app aims to democratize technology and improve vendor practices.Users can win $100 for contributing reviews and feedback.The app will be live for a limited time during the RSA conference.Users can save vendors they want to engage with later.The app features a clean and intuitive interface for easy navigation.Community feedback is crucial for improving vendor services.Dr. Cunningham encourages collaboration to change the tech landscape.

Apr 10, 2025 • 27min
Dr Zero Trust and Faction Networks
In this conversation, Chase Cunningham and Dave Rand discuss the concept of Zero Trust security and how Faction Networks is innovating in this space. They explore the challenges of securing IoT devices, the unique approach of Faction in avoiding central key repositories, and the importance of encryption. The discussion also touches on the future of cybersecurity, the integration of AI, and the user experience in implementing these security measures.TakeawaysZero Trust is essential for modern cybersecurity.Traditional VPNs are inadequate for current security needs.IoT devices pose significant security challenges.Faction Networks uses a unique approach to key management.Encryption is a core component of Faction's security model.Micro-segmentation helps in isolating critical devices.AI can enhance security through anomaly detection.Privacy is a priority in Faction's design.User experience is crucial for security implementation.The future of cybersecurity will involve hardware and software integration.

Apr 7, 2025 • 23min
Visible Ops Book Conversation
In this conversation, Dr. Chase Cunningham and Scott Aldridge discuss the principles of the Visible Ops methodology and its application in cybersecurity. Scott shares his extensive background in IT and cybersecurity, emphasizing the importance of understanding and managing IT assets through effective change and configuration management. They explore practical techniques for implementing cybersecurity best practices, the significance of leadership support, and the challenges organizations face in adopting these practices. The discussion also touches on the value of partnering with managed service providers (MSPs) and the need for a proactive approach to cybersecurity, including the adoption of a zero trust model.TakeawaysYou can't control what you can't measure.Assume breach and prepare accordingly.Progress over perfection is key in cybersecurity.Best practices often aren't implemented effectively.Building cybersecurity expertise in-house is expensive.Partnering with an MSSP can be cost-effective.Integrity management is crucial for IT security.Leadership support is essential for cybersecurity initiatives.Compliance does not guarantee a good cybersecurity posture.Understanding your IT assets is foundational for security.

Mar 27, 2025 • 17min
The Dr Zero Trust Show (the SignalGate Analysis)
In this conversation, Dr. Zero Trust analyzes a recent incident involving the leak of tactical action plans by high-ranking officials through unsecured communication channels. He discusses the implications of this leak on national security, the classification of information, and the accountability of government officials. The conversation highlights the discrepancies in how classified information is treated among different individuals and the need for integrity and accountability in leadership roles.TakeawaysThe incident involved a leak of tactical action plans.High-ranking officials should use secure communication methods.The classification of information is often misinterpreted.There is a double standard in accountability for leaks.Leadership must hold themselves accountable for their actions.The integrity of government officials is crucial for national security.Past incidents of information leaks show a pattern of behavior.The consequences for lower-ranking individuals are harsher than for officials.Public trust in government is eroded by lack of accountability.The conversation emphasizes the importance of protecting classified information.

Mar 20, 2025 • 20min
The Dr Zero Trust Show
In this conversation, Dr. Chase Cunningham, also known as Dr. Zero Trust, discusses the intersection of cybersecurity and finance, focusing on market trends, vulnerabilities, and the implications of recent cybersecurity incidents. He emphasizes the importance of understanding the financial aspects of cybersecurity, including stock performance and investment strategies, while also addressing the challenges faced by government programs and the ongoing threats from ransomware and state-sponsored attacks.TakeawaysCybersecurity is becoming increasingly intertwined with financial markets.Investors should consider buying stocks after breaches for potential rebounds.Government cybersecurity programs face significant vulnerabilities.Microsoft has not patched a critical vulnerability for eight years.Legislative bodies are scrutinizing the DHS's response to cyber threats.Ransomware operations may have connections to state actors.Investment opportunities exist in the cybersecurity sector despite volatility.Fake updates are a common tactic used by ransomware gangs.Understanding the financial impact of cybersecurity breaches is crucial.Staying informed and proactive is essential for cybersecurity.

Mar 17, 2025 • 34min
The Dr Zero Trust Show
In this conversation, Dr. Chase Cunningham and Barry Mainz, CEO of Forescout, discuss the pressing issues surrounding cybersecurity, particularly in critical infrastructure, legacy systems, and the importance of a zero trust approach. They critique the Netflix series 'Zero Day' for its portrayal of cybersecurity threats and explore the current state of security in various sectors, including healthcare and airports. The discussion emphasizes the need for compliance, business continuity, and the integration of cybersecurity into business strategies. They also touch on the future of cybersecurity investments and the importance of considering schools as critical infrastructure.TakeawaysThe portrayal of cybersecurity in media can be exaggerated.Critical infrastructure is vulnerable and requires investment in security.Zero trust principles should be applied to OT and IoT systems.Legacy systems pose significant challenges for cybersecurity.Compliance requirements for OT and IoT are lacking compared to other sectors.Business continuity is a key driver for cybersecurity investments.Cybersecurity discussions should focus on business impacts, not just technical details.Heterogeneous environments require flexible security solutions.Airports vary in their cybersecurity readiness based on age and investment.Healthcare cybersecurity often reacts to breaches rather than preventing them.

Feb 28, 2025 • 24min
The Dr Zero Trust Show
SummaryIn this conversation, Dr. Zero Trust discusses various cybersecurity topics, including active malware campaigns, the risks associated with Veterans Affairs data, and the implications of recent data breaches. He also highlights legislative efforts to improve cybersecurity in the agricultural sector and the importance of cybersecurity for law firms. Additionally, he shares insights on investment strategies related to cybersecurity breaches and concludes with his upcoming travel plans and a new system he's trying for secure mobile use.Active malware campaigns are increasingly prevalent and require attention.Veterans Affairs data is at risk due to cybersecurity failures.Personal data breaches are common, and many individuals are affected.Legislative efforts like the Farm and Food Cybersecurity Act aim to address vulnerabilities.Cybersecurity is essential for law firms to protect sensitive data.Investing in companies post-breach can be financially beneficial.The importance of proactive cybersecurity measures cannot be overstated.Dr. Zero Trust is exploring new technologies for secure mobile use while traveling.Staying informed and secure is crucial in today's digital landscape.

Feb 24, 2025 • 29min
The Dr Zero Trust Show
In this conversation, Dr. Zero Trust discusses the current state of cybersecurity, focusing on leadership appointments, the confusion surrounding cyber threat naming, emerging threats, and the intersection of espionage and cybercrime. He critiques the lack of operational expertise in cybersecurity leadership, highlights the challenges posed by evolving cyber threats, and emphasizes the importance of understanding the implications of AI in cybersecurity operations. The discussion also touches on data privacy legislation efforts, ransomware trends, and the security vulnerabilities in the drone industry.TakeawaysLeadership in cybersecurity should prioritize technical expertise over political loyalty.The U.S. is currently losing the cyber war against adversaries.Confusion in naming cyber threat actors complicates response efforts.Emerging cyber threats are increasingly sophisticated and state-sponsored.AI can significantly enhance cybersecurity operations and efficiency.Data privacy legislation is often ineffective and redundant.Ransomware groups are evolving and becoming more organized.The cybercrime ecosystem is thriving with complex interconnections.Drones present significant security vulnerabilities that could be exploited.Public awareness of cybersecurity risks is crucial for protection.

Feb 18, 2025 • 29min
The Dr Zero Trust Show
In this conversation, Dr. Zero Trust discusses the current state of cybersecurity, focusing on leadership appointments, the confusion surrounding cyber threat naming, emerging threats, and the intersection of espionage and cybercrime. He critiques the lack of operational expertise in cybersecurity leadership, highlights the challenges posed by evolving cyber threats, and emphasizes the importance of understanding the implications of AI in cybersecurity operations. The discussion also touches on data privacy legislation efforts, ransomware trends, and the security vulnerabilities in the drone industry.TakeawaysLeadership in cybersecurity should prioritize technical expertise over political loyalty.The U.S. is currently losing the cyber war against adversaries.Confusion in naming cyber threat actors complicates response efforts.Emerging cyber threats are increasingly sophisticated and state-sponsored.AI can significantly enhance cybersecurity operations and efficiency.Data privacy legislation is often ineffective and redundant.Ransomware groups are evolving and becoming more organized.The cybercrime ecosystem is thriving with complex interconnections.Drones present significant security vulnerabilities that could be exploited.Public awareness of cybersecurity risks is crucial for protection.