Making the Most of a 'Zero Trust' Security Approach

M.K. Palmore of Palo Alto Networks Sorts Through the Myths
M.K. Palmore, vice president and field CSO, Palo Alto Networks

What's the best way to define a "zero trust" approach to security? And what are the potential benefits? M.K. Palmore of Palo Alto Networks, a former FBI agent, offers insights on making the most of the approach.

See Also: New OnDemand | Reacting with Split-Second Agility to Prevent Software Supply Chain Breaches

"The concept of zero trust is about eliminating trust altogether and operating in a way that gives you complete and deep visibility into the environment - and ensuring that every connection is one that's challenged and authenticated correctly," he says.

In a video interview at Information Security Media Group's recent Cybersecurity Summit in New York, Palmore discusses:

  • Myths about the zero trust approach;
  • Obstacles in realizing the benefits;
  • His new role at Palo Alto Networks.

Palmore is vice president and field CSO at Palo Alto Networks. He previously was assistant special agent in charge of the FBI's San Francisco cyber division. Prior to that, he served as a supervisory special agent in the FBI's Sacramento division. Before joining the FBI, he served as a commissioned officer in the United States Marine Corps.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.