Just for knowledge, the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust. Someone just stole the idea.
Most security products and strategies are not new or advanced. This includes the ‘Zero Trust’ strategy, regardless of how frequently vendors mention it. Authentication being used behind the firewall and on the internal devices of a network has been used for decades.
Honestly so many security things now days and 99.999% of business breaches are probably from email credential phishing or some guy doing something stupid like opening up an API database connection with no password 😂. Not that it all doesn’t help.
I thought this was an excellent, concise video on the subject, which really helped fill in the gaps of my understanding. I'm going to sift through your library to see what else you've got. Many thanks!