{"id":26437,"date":"2019-03-28T20:19:15","date_gmt":"2019-03-28T20:19:15","guid":{"rendered":"http:\/\/02fef788-7cf5-4473-bdec-4873d7223c38"},"modified":"2019-03-28T20:19:15","modified_gmt":"2019-03-28T20:19:15","slug":"the-tao-of-zero-trust","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/","title":{"rendered":"The Tao of Zero Trust"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2019\/03\/28\/c5a0eee4-7ff3-438a-9f33-e42c8138e274\/thumbnail\/770x578\/d1783ae01019b4a742777456806f109c\/istock-963458556.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<blockquote readability=\"4.1102362204724\">\n<p><em><strong>Must Read:&nbsp;<\/strong><a href=\"https:\/\/go.forrester.com\/zero-trust\/zero-trust-model\/?utm_source=zdnet&amp;utm_medium=pr&amp;utm_campaign=zerotrust&amp;utm_content=report_%20Cunningham\" target=\"_blank\" rel=\"noopener noreferrer\">Download Forrester&#8217;s complimentary guide<\/a> to learn how and why Zero Trust is the best way to defend your business.&nbsp;<\/em><\/p>\n<\/blockquote>\n<p>I get asked two\u202fquestions at least weekly, in some cases almost daily:&nbsp;<\/p>\n<ol>\n<li><strong>Where do we start for Zero Trust?<\/strong> \u202fFix your IAM and\u202fuser side of the equation.&nbsp;<\/li>\n<li><strong>What is the difference between\u202fother frameworks\u202fand Zero Trust?<\/strong> OK, now we can get down to the nuts and bolts on this one.&nbsp;<\/li>\n<\/ol>\n<p>Zero Trust\u202fturned 10 years old this year. John\u202fKindervag&#8217;s\u202fresearch and analysis of enterprises\u202funcovered\u202fthat\u202fdangerous assumptions of\u202f&#8221;trust&#8221;\u202fhad become\u202fan essential part of the network.\u202fHe realized that the human emotion, trust, was\u202fmore than\u202fa\u202fsimple\u202fflaw;\u202fit represented a major\u202fliability for enterprises&#8217;\u202fnetworks that would lead to failure over and over again in the years to come.&nbsp;<\/p>\n<p>Since 2010,\u202fattackers\u202fhave\u202fbreached\u202fthousands of companies,\u202fstealing\u202fbillions of\u202frecords.\u202fSome companies went out of business, some\u202fgovernments\u202fsuffered geopolitical setbacks that would take years to unravel,\u202fand\u202fmany citizens have lost faith in the\u202fintegrity of\u202ftheir countries&#8217; electoral procedures.\u202fAnd none of those exploits or breaches\u202fever\u202frequired\u202fattackers to use their\u202fmost sophisticated skills or techniques. Most of them began\u202fwith\u202fthe\u202ffailure of\u202fa few\u202fbasic security controls\u202fand\u202fthe inevitable lateral movement\u202fof attackers.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/mueller-report-confirms-the-worst-national-sovereignty-is-at-risk-worldwide\/\"><strong>Mueller report confirms the worst: National sovereignty is at risk worldwide<\/strong><\/a><\/p>\n<p>Zero Trust wasn&#8217;t born out of\u202fa\u202fneed to\u202fsell another security control or solution. It was born\u202ffrom a desire\u202fto solve a real enterprise issue.\u202fAnd just as the threat landscape and the challenges have evolved\u202fover the last 10 years,\u202fForrester has worked to build out\u202fthe original concept into a\u202fsimple\u202fframework we call ZTX, or Zero Trust\u202feXtended.&nbsp;<\/p>\n<p>Our\u202fframework\u202fsolves the architectural and operational issues with Zero Trust\u202f&#8211; namely, how to get started and how to sustain a Zero Trust approach. \u202fZTX\u202fcovers how to\u202f&#8221;build&#8221;\u202fZero Trust\u202finto\u202fthe technology stack of your\u202fenterprise.\u202fIt helps\u202forganizations\u202funderstand how they can choose\u202fsolutions that deliver on\u202f Zero Trust\u202fprinciples\u202fthat enable their strategy over time. Forrester\u202falso\u202frolled out a series (two\u202fso far) of virtual infrastructures\u202fto\u202fshowcase what Zero Trust implementations look like &#8211;\u202fwe ate our own dog food.&nbsp;<\/p>\n<p>Zero Trust\u202fworks, but that doesn&#8217;t make it easy.\u202fForrester\u202fhas clients\u202fengaged in\u202frolling out\u202fZTX\u202ftechnologies and approaches,\u202fand we continue to revise and update our research\u202fas we work with more enterprises.\u202fOur\u202fvirtual architectures\u202ffurther cement\u202fthe validity of our approach.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>You might have noticed an explosion of Zero Trust recently. We think\u202fthis\u202fadoption is based\u202fon two factors:&nbsp;<\/p>\n<ul>\n<li>First, the cybersecurity industry has hit an inflection point wherein the massive spend to prove the negative of &#8220;good security&#8221; is drying up.<\/li>\n<li>Second,\u202fCEOs and board leadership for enterprises are tired of the technical talk and miscommunication around cybersecurity operations.\u202fZero Trust is simple in name,\u202fcomprehensive\u202fin its approach,\u202fand realistic in\u202fthe\u202facceptance of the inherent failures that plague enterprises from the second they start sending electrons.&nbsp;<\/li>\n<\/ul>\n<p>Now\u202ffor\u202fthe other frameworks\u202fquestion.&nbsp;<\/p>\n<p>There are a multitude of other methods, frameworks, builds,\u202fand approaches\u202fthat can be part of a\u202fsecurity strategy.\u202fIf you really do the deep dive on these other approaches, you\u202fwill\u202funderstand that, in\u202ftruth,\u202fthey are\u202fin some way different sides of similar coins.\u202fEvery framework looks at endpoint security, every framework\u202fpushes for user\u202fcontrols and optimal firewall rules,\u202fand every method is aimed at discerning where\u202fvendor\u202ftechnologies can be employed to solve those problems.\u202fEach has their own flavor of\u202fapproach, and in\u202fall honesty,\u202fany of them could be employed as part of a\u202flong-term\u202fstrategy.&nbsp;<\/p>\n<p>OK &#8211;\u202fbut wait a minute.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"http:\/\/www.techproresearch.com\/downloads\/windows-10-security-a-guide-for-business-leaders\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Windows 10 security: A guide for business leaders<\/strong><\/a><strong>&nbsp;TechProResearch<\/strong><\/p>\n<p>Sitting in the analyst chair and talking to\u202fFortune 50\u202forganizations daily that\u202fcan&#8217;t even\u202fdeal with things as simple as enabling MFA, using bad passwords, struggling with\u202ffailed\u202ffirewall\u202fconfigurations, and\u202ffailing to\u202fpatch decade-old servers speaks to a\u202fbigger\u202fissue of\u202fcomplex frameworks and complicated strategies focused on chasing compliance checklists.\u202fIf most enterprises can&#8217;t even do those basic things (read our research and note the numbers on how prolific, basic security controls are abject failures if you doubt this),\u202fthen it stands to reason that\u202femploying\u202fsomething as difficult as continuous\u202fadaptation,\u202for\u202f15,000-word\u202fchecklist documents,\u202fwould be\u202fsomething that is\u202flight years away.\u202fAdd to that the difficulty of detailing\u202fsome frameworks with\u202ffive-letter-long\u202facronyms,\u202fmile-long checklists, and variable inputs,\u202fand the complexity\u202fincreases\u202ffurther.&nbsp;<\/p>\n<p>Zero Trust is focused on simplicity and the reality of how things are now.\u202fWe push organizations to start from Zero Trust and work from that position, continually,\u202fprogrammatically, outwardly.\u202fAnd we tell them this is a process, possibly a multiyear-long one, and that this process never ends &#8212; ever.&nbsp;<\/p>\n<p>The reality in cybersecurity is that\u202feveryone\u202fmust\u202fstop sucking at the basics before we can ever\u202feven consider\u202fmoving\u202fto\u202fsomething as advanced as continually basing security controls and decisions on analytic\u202fcontextual inputs.\u202fThat\u202ftype of advanced\u202fcapability is a nuclear-reactor level of complexity, when most organizations are lucky if they can\u202feven\u202fplug\u202fa\u202flight bulb in.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/what-is-digital-transformation-everything-you-need-to-know-about-how-technology-is-reshaping\/\" target=\"_blank\"><strong>What is digital transformation? Everything you need to know<\/strong><\/a><\/p>\n<p>Couple simplicity and clarity with a decade of research, real-world use cases, an industry lining up to be\u202fevaluated for inclusion, and\u202factual functional\u202fdeployments of the strategy, and\u202fsuddenly one\u202fof these approaches seems a bit more\u202fpragmatic.&nbsp;<\/p>\n<p><em>This post originally appeared&nbsp;<\/em><a href=\"https:\/\/go.forrester.com\/blogs\/the-tao-of-zero-trust\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>here<\/em><\/a><em>.&nbsp; &nbsp;<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/the-tao-of-zero-trust\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zero Trust wasn\u2019t born out of a need to sell another security control or solution. It was born from a desire to solve a real enterprise issue.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26438,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-26437","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Tao of Zero Trust 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Tao of Zero Trust 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-28T20:19:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/the-tao-of-zero-trust.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Tao of Zero Trust\",\"datePublished\":\"2019-03-28T20:19:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/\"},\"wordCount\":967,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/the-tao-of-zero-trust.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/\",\"name\":\"The Tao of Zero Trust 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/the-tao-of-zero-trust.jpg\",\"datePublished\":\"2019-03-28T20:19:15+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/the-tao-of-zero-trust.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/the-tao-of-zero-trust.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Tao of Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Tao of Zero Trust 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"The Tao of Zero Trust 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-28T20:19:15+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/the-tao-of-zero-trust.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Tao of Zero Trust","datePublished":"2019-03-28T20:19:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/"},"wordCount":967,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/the-tao-of-zero-trust.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/","url":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/","name":"The Tao of Zero Trust 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/the-tao-of-zero-trust.jpg","datePublished":"2019-03-28T20:19:15+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/the-tao-of-zero-trust.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/the-tao-of-zero-trust.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-tao-of-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"The Tao of Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26437"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26437\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26438"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}