<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>zero trust Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/zero-trust/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/zero-trust</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Wed, 21 Apr 2021 09:13:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.3</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>zero trust Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/zero-trust</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Webinar Takeaway: Zero Trust-Modelle ohne Reibungsverluste umsetzen</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-zero-trust-modelle-ohne-reibungsverluste-umsetzen</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-zero-trust-modelle-ohne-reibungsverluste-umsetzen#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 21 Apr 2021 09:13:33 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[anomaly detection]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=426</guid>

					<description><![CDATA[<p>My key takeaways the concept of pure perimeter security (inside is good, outside is evil) is outdated What is zero trust invented 2010 by John Kindervag not automatically trust and grant access to a known user, device, account&#8230; but check if priviledged To implement a zero trust concept a lot of components and different software [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-zero-trust-modelle-ohne-reibungsverluste-umsetzen">Webinar Takeaway: Zero Trust-Modelle ohne Reibungsverluste umsetzen</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-zero-trust-modelle-ohne-reibungsverluste-umsetzen/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
