Topic
Best Zero trust security Podcast Episodes
Zero trust security is covered across 1 podcast episode in our library — including Darknet Diaries. Conversations explore core themes like zero trust, deny by default, drawing on firsthand experience and research from leading practitioners.
Below you'll find key insights, core concepts, and actionable advice aggregated from the top episodes — followed by a ranked list of the best zero trust security discussions to explore next.
Key Insights on Zero trust security
- 1.Ransomware attacks can be devastating, exemplified by a manufacturing company’s entire network of 250 servers and 350 endpoints being encrypted in 15 minutes by the Kanti gang, leading to a three-week business shutdown (04:05, 05:09, 10:23, 11:25).
- 2.Traditional antivirus and EDR solutions may not be sufficient to stop sophisticated ransomware, as one company found Malwarebytes enterprise platform “wasn’t really doing the job that we’d hoped” (13:33).
- 3.The “deny by default” or “Zero Trust” security model, implemented by ThreatLocker, blocks all applications from running unless explicitly approved, acting like a firewall for applications rather than a router (15:02, 36:56).
- 4.Zero Trust is not about saying “no” but granting the least privilege necessary for job functions, contrasting with “detection and response” models that only block detected anomalies (35:54).
- 5.Layered security (defense in depth) is crucial; ThreatLocker successfully stopped a ransomware attack at a hospital even after a threat actor gained full domain admin access via compromised VPN credentials because MFA was not implemented (21:03, 22:53, 23:26).
- 6.The effectiveness of ThreatLocker is supported by Danny Jenkins' claim that among 70,000 companies using the product, there has never been a ransomware case where policies were correctly followed, emphasizing its preventative power (43:53, 44:37).
Key Concepts in Zero trust security
Zero trust
A security model that verifies everything by default, granting the least amount of privileges necessary for users and applications to perform their job functions, rather than implicitly trusting entities within the network perimeter (35:24, 35:54). This episode presents it as a paradigm shift from traditional “castle-and-moat” security, offering superior protection against internal threats and sophisticated attacks by making trust explicit and continually validated.
Deny by default
An approach within Zero Trust where all applications and actions are blocked unless explicitly allowed by an authorized administrator (15:02, 36:56). Danny Jenkins highlights its importance as a fundamental change in security philosophy, making it effective against unknown malware and ransomware by preventing unauthorized execution rather than just detecting known threats, effectively turning application execution into a firewall-like function.
Actionable Takeaways
- ✓Evaluate your current security posture to determine if it operates on a “default allow” or “default deny” principle for applications, aiming to shift towards deny-by-default for stronger protection (15:02, 36:56).
- ✓Implement multi-factor authentication (MFA) on all internet-facing portals and computers, especially VPNs, to prevent initial access even if credentials are compromised (21:03, 23:26, 41:36).
- ✓Establish clear protocols and playbooks for ransomware incidents, including immediate network shutdown, communication plans, and a structured recovery process like the “red, amber, green” system (03:36, 04:05, 08:13).
- ✓Consider application control or whitelisting solutions like ThreatLocker to block unapproved software, even if it’s new or unknown malware, thereby preventing its execution (13:33, 14:36, 39:32).
- ✓Communicate the severity of cyber threats, like ransomware, to users and leadership to gain buy-in for stricter security measures, emphasizing potential business outages (17:41, 18:03).
Top Episodes — Ranked by Insight (1)
Darknet Diaries
Default to Deny: Why Network Security Is Shifting to "Zero Trust" ⛔ Ep. 167 ThreatLocker
Ransomware attacks can be devastating, exemplified by a manufacturing company’s entire network of 250 servers and 350 endpoints being encrypted in 15 minutes by the Kanti gang, leading to a three-week business shutdown (04:05, 05:09, 10:23, 11:25).
Episodes ranked by insight density — scored on key takeaways, concepts explained, and actionable advice. AI-generated summaries; listen to full episodes for complete context.


