<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Zero Trust Archives - Jay Longley</title>
	<atom:link href="https://jaylongley.com/tag/zero-trust/feed/" rel="self" type="application/rss+xml" />
	<link>https://jaylongley.com/tag/zero-trust/</link>
	<description>Innovator, Technologist &#38; Aviator</description>
	<lastBuildDate>Thu, 28 Mar 2024 20:32:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jaylongley.com/wp-content/uploads/2022/09/cropped-skull01-32x32.jpg</url>
	<title>Zero Trust Archives - Jay Longley</title>
	<link>https://jaylongley.com/tag/zero-trust/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Canary Tokens: Enhancing Network Security</title>
		<link>https://jaylongley.com/understanding-canary-tokens-enhancing-network-security/</link>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Sun, 21 Jan 2024 20:37:33 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Canary Tokens]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=969</guid>

					<description><![CDATA[<p>Canary Tokens: Early Warning, Stronger Defense in Network Security</p>
<p>The post <a href="https://jaylongley.com/understanding-canary-tokens-enhancing-network-security/">Canary Tokens: Enhancing Network Security</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading" id="h-introduction-to-canary-tokens">Introduction to Canary Tokens</h2>



<p>In the evolving landscape of cybersecurity, organizations continually seek innovative strategies to detect and prevent unauthorized access to their networks. One such strategy, that has been around for years, yet is seldom used, involves &#8220;Canary Tokens&#8221;. These are not physical birds in a coal mine, but rather cleverly devised digital traps that serve a similar purpose: to warn of danger in your network.  They are also a great tool to integrate into your <a href="https://jaylongley.com/what-is-zero-trust-for-technologists/">Zero Trust deployment</a>.</p>



<h2 class="wp-block-heading" id="h-what-are-canary-tokens">What are Canary Tokens?</h2>



<p>Canary Tokens are a type of decoy or bait. They are small, digital files or configurations that appear valuable or sensitive but are actually closely monitored traps. When an attacker accesses or interacts with a Canary Token, it triggers an alert, notifying the security team of a possible breach.  If you have ever downloaded my resume from this website, you have activated one of my canary tokens, which let me know you are looking at my file.  Feel free to generate your own <a href="https://canarytokens.org/generate">HERE</a> and play with the technology!</p>



<p>Examples of Canary Tokens include:</p>



<ol class="wp-block-list">
<li><strong>Fake files:</strong> These might look like important documents but are actually set to alert administrators when opened.</li>



<li><strong>URLs or DNS records:</strong> When accessed, they notify administrators.</li>



<li><strong>Database tokens:</strong> These appear as tempting data entries in a database.</li>



<li><strong>Email addresses:</strong> Unique email addresses that, when emailed, indicate a data breach.</li>



<li><strong>Real files with call home features:</strong> My resume from this website calls home every time it is opened.</li>
</ol>



<h2 class="wp-block-heading" id="h-why-do-you-need-canary-tokens-in-your-network">Why Do You Need Canary Tokens in Your Network?</h2>



<h3 class="wp-block-heading" id="h-early-detection-of-breaches">Early Detection of Breaches</h3>



<p>The primary advantage of these Tokens is early detection. Traditional security measures often detect breaches only after significant damage has been done. Canary Tokens, on the other hand, can alert you at the first sign of unauthorized access, often before any real data is compromised.</p>



<h3 class="wp-block-heading" id="h-low-cost-high-reward">Low Cost, High Reward</h3>



<p>Implementing Canary Tokens is generally inexpensive, especially compared to the cost of dealing with a full-scale data breach. Despite their low cost, they can be highly effective in trapping unsuspecting attackers.</p>



<h3 class="wp-block-heading" id="h-easy-to-deploy-and-manage">Easy to Deploy and Manage</h3>



<p>Tokens of this type, can be created and deployed with minimal technical expertise and do not require extensive maintenance. This ease of use makes them accessible to businesses of all sizes.</p>



<h3 class="wp-block-heading" id="h-deterrence">Deterrence</h3>



<p>The presence of these Tokens can act as a deterrent. Attackers who stumble upon these tokens may abandon their efforts, fearing that they have been discovered.</p>



<h3 class="wp-block-heading" id="h-complements-existing-security-measures">Complements Existing Security Measures</h3>



<p>These Tokens are not meant to replace existing security measures but to complement them. They add an extra layer of defense, working alongside <a href="https://jaylongley.com/what-is-zero-trust-for-everyone/">zero trust architectures</a>, firewalls, intrusion detection systems, and other security protocols.</p>



<h2 class="wp-block-heading" id="h-best-practices-for-implementing-canary-tokens">Best Practices for Implementing Canary Tokens</h2>



<ol class="wp-block-list">
<li><strong>Strategic Placement:</strong> Place tokens where they are most likely to be accessed by an intruder, such as in sensitive directories.</li>



<li><strong>Variety and Unpredictability:</strong> Use various types of tokens and change them regularly to avoid predictability.</li>



<li><strong>Monitoring and Response Plan:</strong> Have a plan for how alerts will be monitored and how to respond in case of a breach.</li>



<li><strong>Regular Updates and Audits:</strong> Regularly update and audit your tokens to ensure they remain effective.</li>
</ol>



<h2 class="wp-block-heading" id="h-conclusion">Conclusion</h2>



<p>Canary Tokens are a simple, cost-effective, and powerful tool in the arsenal of network security. They offer an additional layer of reactive defense, helping to detect breaches early and minimize potential damage. As cybersecurity threats continue to evolve, tools like Canary Tokens become increasingly important in safeguarding digital assets as it is not just about building higher walls, but also about setting smarter traps. </p>
<p>The post <a href="https://jaylongley.com/understanding-canary-tokens-enhancing-network-security/">Canary Tokens: Enhancing Network Security</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Due Diligence Questionnaire &#8211; Cybersecurity</title>
		<link>https://jaylongley.com/due-diligence-questionnaire-cybersecurity/</link>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Wed, 31 May 2023 01:19:49 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DDQ]]></category>
		<category><![CDATA[Due Diligence Questionnaire]]></category>
		<category><![CDATA[Questionnaire]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=842</guid>

					<description><![CDATA[<p>Below you will find a simplified due diligence questionnaire focusing on cybersecurity....</p>
<p>The post <a href="https://jaylongley.com/due-diligence-questionnaire-cybersecurity/">Due Diligence Questionnaire &#8211; Cybersecurity</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2>Introduction</h2>
<p>Below you will find a simplified due diligence questionnaire focusing on cybersecurity.  While I personally recommend using a framework such as the <a href="https://sharedassessments.org/sig/">Standard Information Gathering Assessment</a>, not all need something that comprehensive.</p>



<h4>Due Diligence Questionnaire</h4>
<p>1. Do you have a documented cybersecurity policy in place?<br>2. Are there designated personnel responsible for cybersecurity within your organization?<br>3. How do you identify and assess cybersecurity risks?<br>4. Do you have a process for regularly updating and patching software and systems?<br>5. How do you protect your network and systems from unauthorized access?<br>6. Have you implemented multi-factor authentication for accessing sensitive systems and data?<br>7. How do you manage and protect user accounts and access privileges?<br>8. Do you conduct regular security awareness training for employees?<br>9. How do you monitor and detect cybersecurity incidents or breaches?<br>10. Do you have an incident response plan in place? If so, how often is it tested?<br>11. Have you experienced any significant cybersecurity incidents in the past? If so, how were they addressed?<br>12. How do you secure sensitive data and ensure its confidentiality?<br>13. Do you encrypt data in transit and at rest?<br>14. Are your systems and applications regularly scanned for vulnerabilities?<br>15. How do you protect against malware, including ransomware?<br>16. Do you have intrusion detection and prevention systems in place?<br>17. Have you implemented secure coding practices for your software development processes?<br>18. Do you perform regular penetration testing to identify vulnerabilities?<br>19. How do you ensure third-party vendors or partners adhere to your cybersecurity requirements?<br>20. Do you comply with relevant cybersecurity standards and regulations, such as GDPR or HIPAA?</p>



<p>To create a customized Due Diligence Questionnaire / DDQ for your organization, you can copy and modify the above code, or you can contact me for assistance in creating a comprehensive questionnaire.</p>



<p>For more CISO Articles, please see:<br><a href="https://jaylongley.com/category/ciso/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/category/ciso/</a></p>
<p>The post <a href="https://jaylongley.com/due-diligence-questionnaire-cybersecurity/">Due Diligence Questionnaire &#8211; Cybersecurity</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Consequences of Non-Compliance with CJIS</title>
		<link>https://jaylongley.com/consequences-of-non-compliance-with-cjis/</link>
					<comments>https://jaylongley.com/consequences-of-non-compliance-with-cjis/#comments</comments>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Wed, 31 May 2023 01:16:45 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[CJIS]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=840</guid>

					<description><![CDATA[<p>Non-compliance with CJIS can expose organizations to legal liabilities, including potential lawsuits, damages, and legal consequences</p>
<p>The post <a href="https://jaylongley.com/consequences-of-non-compliance-with-cjis/">Consequences of Non-Compliance with CJIS</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Non-compliance with CJIS (Criminal Justice Information Services) requirements can have various consequences, both at the federal and state levels. Here are some potential outcomes of not being CJIS compliant:</p>



<h3>Loss of access to critical systems:</h3><p>Failure to comply with CJIS requirements may result in the suspension or revocation of an organization&#8217;s access to CJIS systems and data. This can severely impact the ability of law enforcement agencies or other criminal justice entities to carry out their duties effectively.</p>



<h3>Penalties and fines:</h3><p>Non-compliance with CJIS may lead to financial penalties imposed by federal or state authorities. The exact amount of fines can vary depending on the severity of the violation and the governing jurisdiction.</p>



<h3>Legal liabilities: </h3><p>Non-compliance with CJIS can expose organizations to legal liabilities, including potential lawsuits, damages, and legal consequences. Failure to protect sensitive criminal justice information adequately can result in legal actions from affected individuals or entities.</p>



<h3>Reputational damage: </h3><p>Not being CJIS compliant can harm an organization&#8217;s reputation and trustworthiness, particularly in the criminal justice sector. Negative publicity surrounding data breaches or security incidents can erode public confidence and impact relationships with partners, stakeholders, and the community.</p>



<h3>Loss of future opportunities: </h3><p>CJIS compliance is often a prerequisite for collaborating with federal agencies, participating in criminal justice initiatives, or obtaining certain contracts or grants. Non-compliant organizations may be excluded from these opportunities, limiting their growth and participation in relevant programs.</p>



<h3>Increased security risks: </h3><p>Non-compliance with CJIS requirements can leave organizations vulnerable to cyberattacks, data breaches, and unauthorized access to sensitive information. Inadequate security measures may result in the compromise of criminal justice data, leading to potential harm to investigations, public safety, and individuals&#8217; privacy.</p>



<p>To avoid these consequences, organizations involved in handling criminal justice information should prioritize CJIS compliance. This involves implementing the necessary security controls, conducting regular assessments and audits, providing security awareness training to personnel, and staying up to date with any updates or changes to the CJIS Security Policy. It is advisable to consult with legal and security professionals familiar with CJIS compliance to ensure proper adherence to the requirements.</p>



<p>To learn about CJIS at an entry level, visit:<br><a href="https://jaylongley.com/what-is-cjis-compliance/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/what-is-cjis-compliance/</a></p>



<p>For more CISO related resources here, please visit:<br><a href="https://jaylongley.com/category/ciso/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/category/ciso/</a></p>



<p>To learn more about the FBI CJIS guidelines, please visit the following link:<br><a href="https://www.fbi.gov/file-repository/cjis-security-policy_v5-8_20190601.pdf" target="_blank" rel="noreferrer noopener">https://www.fbi.gov/file-repository/cjis-security-policy_v5-8_20190601</a></p>
<p>The post <a href="https://jaylongley.com/consequences-of-non-compliance-with-cjis/">Consequences of Non-Compliance with CJIS</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://jaylongley.com/consequences-of-non-compliance-with-cjis/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>What is CJIS Compliance</title>
		<link>https://jaylongley.com/what-is-cjis-compliance/</link>
					<comments>https://jaylongley.com/what-is-cjis-compliance/#comments</comments>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Wed, 31 May 2023 01:13:58 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[CJIS]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=838</guid>

					<description><![CDATA[<p>Criminal Justice Information Services (CJIS) Security Policy, which is a set of guidelines and requirements established by....</p>
<p>The post <a href="https://jaylongley.com/what-is-cjis-compliance/">What is CJIS Compliance</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>CJIS compliance means following the FBI&#8217;s Criminal Justice Information Services Security Policy. This policy outlines guidelines and requirements for organizations in the U.S. that deal with criminal justice information (CJI).</p>



<p>The CJIS Security Policy mandates strict security controls and measures to protect CJI. It addresses physical and personnel security, access controls, authentication, encryption, incident response, and auditing. Its goal is to safeguard the confidentiality, integrity, and availability of CJI at all times.</p>



<p>Law enforcement agencies, courts, correctional facilities, and other criminal justice entities must comply. They need to implement required security controls and prove their compliance through audits and assessments.</p>



<p>To meet CJIS security requirements, organizations must set up proper safeguards, offer security training, assess risks, control access, and secure CJI&#8217;s transmission and storage.</p>



<p>Failing to comply with CJIS standards can lead to severe consequences. These include losing access to essential systems, facing penalties, legal issues, reputational harm, and affecting criminal investigations.</p>



<p>Organizations handling CJI should get to know the CJIS Security Policy well. They must work to put in place and keep up the necessary security measures for compliance.</p>



<p>To learn more about the consequences of being out of compliance with CJIS, visit:<br><a href="https://jaylongley.com/consequences-of-non-compliance-with-cjis/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/consequences-of-non-compliance-with-cjis/</a></p>



<p>For more CISO related resources here, please visit:<br><a href="https://jaylongley.com/category/ciso/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/category/ciso/</a></p>



<p>To learn more about the FBI CJIS guidelines, please visit the following link:<br><a href="https://www.fbi.gov/file-repository/cjis-security-policy_v5-8_20190601.pdf" target="_blank" rel="noreferrer noopener">https://www.fbi.gov/file-repository/cjis-security-policy_v5-8_20190601.pdf</a></p>
<p>The post <a href="https://jaylongley.com/what-is-cjis-compliance/">What is CJIS Compliance</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://jaylongley.com/what-is-cjis-compliance/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>What is Zero Trust (For Everyone)</title>
		<link>https://jaylongley.com/what-is-zero-trust-for-everyone/</link>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Sun, 21 May 2023 13:25:34 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=828</guid>

					<description><![CDATA[<p>What is Zero Trust...This is an explaination for everyone.</p>
<p>The post <a href="https://jaylongley.com/what-is-zero-trust-for-everyone/">What is Zero Trust (For Everyone)</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine you have a box filled with your favorite toys, and you want to make sure they are safe. Normally, you might let your best friend into your room because you trust them. But what if there&#8217;s a chance someone else could sneak in and take your toys? That&#8217;s where &#8220;zero trust&#8221; comes in.</p>
<p>With zero trust, you don&#8217;t automatically trust anyone who comes into your room, even if they&#8217;re your friend. Instead, you check and make sure they are who they say they are and that they&#8217;re allowed to be there. You might ask them for a secret code or use a special key to open the treasure chest. This way, you&#8217;re being careful and checking everyone before letting them play with your toys.</p>
<p>Zero trust is like having a special security system for your toys. It&#8217;s all about making sure only the right people can access your treasures. This way, even if someone sneaks into your room, they won&#8217;t be able to take your toys because they haven&#8217;t proven themselves trustworthy. It&#8217;s a way to keep your things safe and make sure only the right people can get to them.</p>
<p>If you are looking for a more consumable information on Zero Trust here, check out my article: <a href="https://jaylongley.com/what-is-zero-trust-for-technologists/">https://jaylongley.com/what-is-zero-trust-for-technologists/</a></p>
<p>If you would like to learn more about the Federal Government&#8217;s Zero Trust Strategy, you can find that here: <a href="https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf" data-wplink-edit="true">https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf</a></p>
<p>The post <a href="https://jaylongley.com/what-is-zero-trust-for-everyone/">What is Zero Trust (For Everyone)</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is Zero Trust? (For Technologists)</title>
		<link>https://jaylongley.com/what-is-zero-trust-for-technologists/</link>
					<comments>https://jaylongley.com/what-is-zero-trust-for-technologists/#comments</comments>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Sun, 21 May 2023 13:19:22 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=825</guid>

					<description><![CDATA[<p>What is Zero Trust...Here it is explained for Technologists to review.</p>
<p>The post <a href="https://jaylongley.com/what-is-zero-trust-for-technologists/">What is Zero Trust? (For Technologists)</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="825" class="elementor elementor-825">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-c3ae39d elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="c3ae39d" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a1563bb" data-id="6a1563bb" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-2f7442ff elementor-widget elementor-widget-text-editor" data-id="2f7442ff" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>What is Zero Trust.  In simple terms, it is a cybersecurity strategy that doesn&#8217;t automatically trust users or devices, even if they&#8217;re already inside the network. Unlike traditional models that give broad access once someone is inside, a zero trust framework keeps a tight rein on access. It constantly checks who&#8217;s asking to enter, their device&#8217;s security status, where they are, and what they&#8217;re doing before letting them in. This careful vetting helps stop insider threats and other risks dead in their tracks.</p><p>At its heart, the framework demands that every access request is authenticated and authorized. It doesn&#8217;t matter where the request comes from; the motto is &#8220;never trust, always verify&#8221;. This means always double-checking identities and making sure everyone has just enough access to do their job, nothing more.</p><p>Here are the essentials of zero trust:</p><p>1. Identity-based Access: Who you are matters more than where you are. Access depends on your identity and permissions.<br />2. Least Privilege: Get only the access you need, limiting the damage from any security slip-ups.<br />3. Multi-factor Authentication (MFA): Prove who you are in several ways before getting in.<br />4. Micro-segmentation: Breaking the network into smaller, isolated parts makes it harder for threats to spread.<br />5. Continuous Monitoring: Keeping an eye on user actions, device health, and network traffic spots trouble early.<br />6. Strict Access Controls: Firm rules apply to everyone, no matter where they are or how they connect.</p><p>Embracing zero trust means an organization can better protect its data and systems. By assuming nothing is safe and always verifying, companies can fend off data breaches more effectively.</p><p>For a straightforward explanation of Zero Trust, visit my article:<a href="https://jaylongley.com/what-is-zero-trust-for-technologists/"> https://jaylongley.com/what-is-zero-trust-for-technologists/</a></p><p>To dive deeper into the Federal Government’s Zero Trust Strategy, check this out: <a href="https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf">https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf</a></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://jaylongley.com/what-is-zero-trust-for-technologists/">What is Zero Trust? (For Technologists)</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://jaylongley.com/what-is-zero-trust-for-technologists/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
