DiscoverThe Zero Trust Zone
The Zero Trust Zone
Claim Ownership

The Zero Trust Zone

Author: Michael Van Horenbeeck

Subscribed: 0Played: 0
Share

Description

Welcome to The Zero Trust Zone — your go-to podcast for all things Microsoft 365 Security and beyond.
Each episode dives into the ever-evolving world of cloud security, exploring the latest features, tools, and strategies across Microsoft Entra, Defender, Purview, and the broader Microsoft Security stack. Whether you’re a security architect, IT pro, or just curious about how to keep your digital world locked down, you’re in the right place.

No fluff. Just practical, modern security — delivered with a healthy dose of curiosity, humor, and zero trust!
2 Episodes
Reverse
Welcome back to The Zero Trust Zone! In this episode, we’re joined by Microsoft MVP and identity security expert Thomas Naunheim to dive deep into a powerful Zero Trust design pattern: the bastion tenant.👉 What is a bastion tenant?👉 Why are more organizations isolating their admin identities into separate, hardened tenants?👉 Is this a must-have security strategy—or just a legacy relic from on-prem Active Directory guidance?We break down what a bastion tenant really is, how it fits into your modern cloud architecture, and whether it's worth implementing in your own environment.For more information on the elements discussed in this episode, make sure to check out the following links:- https://www.entraops.com (https://www.cloud-architekt.net/entraops/)- https://www.glueckkanja.com/en/security/managed-red-tenant (Glueck Kanja)
In this episode of the Zero Trust Zone podcast, host Michael Van Horenbeeck speaks with Rohit Gulati from Microsoft about decentralized identities and their growing importance in cybersecurity. They discuss the principles of decentralized identity, the role of trust systems, and how Microsoft is addressing these challenges with its verified ID solution. The conversation also touches on the need for portable identities, the balance between authorization and authentication, and the future of identity management in a rapidly evolving digital landscape.
Comments 
loading