The Zero Trust Hub

Trends, insights, and resources for today's cybersecurity leaders. Updated weekly.

Subscribe on LinkedIn
Weekly Podcast

The Monday Microsegment

NEWS

Thinking Big Thoughts: John Kindervag on How Zero Trust Became a $36 Billion Industry

In the Expert Insights podcast, John Kindervag traces the origin and global impact of Zero Trust, a concept he coined at Forrester that now underpins a $36 billion market. Kindervag explains that trust is a four-letter word in security — and why one “oopsie” shouldn’t always negate 1,000 “attaboys.”

NEWS

NHS Charter is a Baby Step Towards Patient Safety. What We Really Need Is Enforecement.

In Digital Health News, Trevor Dearing urges the NHS to move beyond its new voluntary cybersecurity charter with mandatory measures. He argues that only real accountability, breach containment, and ongoing investment in resilience can safeguard NHS operations and patient safety.

Weekly Briefing

Why Zero Trust Security Is a Threat Hunter’s Most Powerful Investigative Tool

It feels like being called to a crime scene in the middle of the night.

That’s how I describe the start of a cyber investigation. It’s dark — literally and figuratively. You don’t know what happened yet. You don’t know who was involved, what they touched, or what they took. You just know something’s wrong.

The reality is that today’s attackers don’t leave behind the digital equivalent of broken glass or a forced door. They know how to blend in, clean up after themselves, and plant false leads.  

The most dangerous breaches often don’t look like breaches at all, just subtle changes in behavior that only make sense when you connect the dots after the fact.

That’s why Zero Trust has become a necessity for anyone in threat hunting.  

When you start from the assumption that compromise is always possible — that trust has to be earned, not given — you don’t wait for the damage to show itself. You start investigating before the threat can spread. You build systems that make it harder for attackers to hide and easier for defenders to respond.

Zero Trust is key after the breach

If you’re responding to an incident, you’re probably not preventing attacks. You’re already in the aftermath.  

You’re piecing together what happened, how it happened, and what else might still be at risk.

The problem is that most environments are built to trust too much. We assume users and apps are who they say they are. That east-west traffic is legitimate. That systems within the same environment can talk freely.

But attackers exploit that trust. They don’t knock on the front door. Instead, they often slide through a forgotten credential, a misconfigured workload, or a legacy application nobody remembered to retire.

In today’s threat landscape, the question is just as much “How did they get in?” as it is “What did they do after?”

Zero Trust helps answer that question before it even needs to be asked.

Zero Trust is an investigative mindset

The goal of threat hunting is to find bad behavior and, perhaps more important, understand intent. That requires visibility, context, and a constant skepticism of activity that doesn’t belong.

Zero Trust aligns perfectly with this investigative mindset:

  • Never trust, always verify means you’re not assuming legitimacy just because something looks routine.
  • Enforce least-privilege access means you know exactly what should and shouldn’t be accessible.
  • Assume breach means you don’t wait for an alert to start asking questions.

When every device, user, and application has to prove its legitimacy in real time, threat hunters can stop looking for a needle in a haystack because they’ve already reduced the haystack to what matters most.

What real threat hunters need

Threat hunting is just as much about tools as it is about telemetry, timing, and terrain:

  • Telemetry: You need the right signals, not all the signals. Focus on how data is accessed, where it moves, and what processes triggered that movement.
  • Timing: Retrospective analysis is great, but real-time enforcement changes the game. You want to contain threats while you’re still investigating.
  • Terrain: You need to understand the environment you’re defending. That means knowing who should be talking to what and what “normal” actually looks like.

The question is this, “Will an attacker know more about your network than you do?”

Zero Trust helps threat hunters in all three areas. It provides clarity about what is allowed and shines a light on everything that deviates from those norms.

Why “trust” is the root of the problem

Many threat hunters I speak with are still typically cleaning up after environments that were built on implicit trust.

It shows up as:

  • Systems that communicate too freely
  • Users with more access than they need
  • Monitoring tools overwhelmed with irrelevant data

In other words, too much signal and not enough insight.

Zero Trust doesn’t eliminate complexity. But it gives you a principled way to reduce the attack surface and focus your attention. It turns security from an open-ended puzzle into a solvable investigation.

When you don’t trust by default, you investigate by design

The best investigations don’t start with panic. They start with structure.

Zero Trust gives defenders a framework to build environments where evidence is easier to find, behavior is easier to verify, and compromise is easier to contain.

As a threat hunter, this makes your work more proactive, more precise, and more powerful.

It’s not about building taller walls. It’s about shrinking the playground attackers can operate in. And it’s not about assuming you’re safe. It’s about being ready when reality is that no one is .

Zero Trust helps you build for the investigation, not just the breach

We all want to stop threats before they land. But real-world security means planning for the moment after they do.

That moment is where threat hunting matters most. And it’s where Zero Trust proves its value.

So if you’re leading a security team, ask yourself: Is your environment built to trust? Or is it built to investigate?

Because in cybersecurity today, the difference between the two might be the difference between a minor incident — and a major breach.

STATSHOT

Paying Isn’t Protection

Paying a ransom doesn’t mean the pain ends. According to The 2025 Global Cost of Ransomware Study, fewer victims are receiving decryption keys than in past years. And even when attackers do provide one, it doesn’t stop the damage. Many organizations reported that their stolen data was still leaked or misused after paying up. In some cases, they were hit with demands for even more money. The data shows what many experts have long warned: paying the ransom is no guarantee of recovery or safety.

Zero Trust Resources

eBook

Strategies for DORA Compliance: Key Role of Zero Trust Segmentation

Is your organization ready for the January 2025 DORA deadline? Discover key strategies for cyber resilience and how Illumio Zero Trust Segmentation simplifies compliance.

GUIDE

Zero Trust Segmentation for Dummies

Breaches are inevitable, but the damage isn’t. Zero Trust Segmentation for Dummies simplifies how to stop threats from spreading, protecting your organization before they cause harm.

REPORT

2025 Global Cost of Ransomware Study

Some 88% of organizations were hit by ransomware in the last year. Are your defenses ready to stand up to today’s ransomware threat? Uncover the real impact of ransomware and strategies to stay resilient against the next inevitable attack.

Introducing Illumio Insights:
AI Cloud Detection and Response

Get an early look at the first cloud detection and response (CDR) solution built on an AI security graph. Watch the on-demand webinar now.

Top contributors

John Kindervag

Chief Evangelist

Raghu Nandakumara

Head of Industry Solutions

Gary Barlet

Public Sector CTO

Trevor Dearing

Director of Critical Infrastructure Solutions

Michael Adjei

Director, Systems Engineering

Christer Swartz

Director of Industry Solutions

Scott Smith

Analyst Relations Director