Zero Trust vs Zero Trust Network Access

Let's go down the road of Zero Trust and Zero Trust Network Access (ZTNA) for a moment.

Let's begin with Zero Trust. Zero Trust is a broad security model!
Zero Trust assumes that no one, or nothing, should be trusted by default, which will require continuous verification before granting access to resources.

Zero Trust Network Access (ZTNA) on the other hand, is a specific implementation of the Zero Trust security model, with its focus primarily on securing remote access to applications and data, by strictly controlling user and device authentication before granting access - essentially acting as a more secure alternative to traditional VPNs.

Zero Trust -> the overall security philosophy.

Zero Trust Network Access (ZTNA) -> a technology, used to achieve the security philosophy in the context of network access.

Some key differences:

Scope:
- Zero Trust applies to all aspects of security across an organization.
- ZTNA specifically focuses on managing access to applications and data from anywhere, especially for
remote users.

Implementation:
- Zero Trust is a broader framework, that can be implemented through various technologies and
strategies
- ZTNA is a specific technology, used to enforce zero trust principles for network access

Focus:
- Zero trust emphasizes continuous verification, and least privilege access, across all systems
- ZTNA focuses on user identity and device posture, before granting access to application, often
bypassing the traditional network perimeter.

My Summary:

Zero Trust

- a framework
- a security philosophy

Zero Trust Network Access (ZTNA)
- a technology
- the item used to enforce the security philosophy


Okay, all this is nice to know, but that's not why I stopped by. What I wanted to ask,
is Zero Trust Network Access (ZTNA) covered in any of the CompTIA courses?


Thanks CINners
  • Love
Reactions: precious

Ransomware Attacks

Ransomware attacks against U.S. organizations in 2024 disrupted healthcare systems, supply chains, and government services, and led to tens of millions of dollars in ransom payments. Here are 10 of the most prominent attacks against U.S. organizations for the year 2024:​


LoanDepot​

On Jan. 8, California-based mortgage lender LoanDepot disclosed an attack in an 8K filing with the U.S. Securities and Exchange Commission (SEC). The company said attackers were in its systems from Jan. 3 through Jan. 5 and engaged in malicious activity that included "access to certain Company systems and the encryption of data."

Veolia​

On Jan. 19, Veolia North America disclosed it was investigating a ransomware attack that occurred one week prior and disrupted certain software applications and systems in the company's network. The Boston-based water, waste and energy recycling management company forced its back-end systems offline, which disrupted customer billing and payment services.

Change Healthcare​

One of the year's most significant attacks, if not the most significant, occurred against UnitedHealth Group's Change Healthcare on Feb. 21. The healthcare technology company, which provides payment and reimbursement services, suffered a massive data breach, prolonged disruptions and substantial recovery costs.

Ascension​

Ascension is another healthcare organization that suffered a significant ransomware attack this year. On May 8, the St. Louis-based healthcare system disclosed that ransomware disrupted its electronic health record (EHR), some phone systems, patient portals and other important systems patients use to order tests, procedures and medications. Patient portals and EHR systems remained down for a little more than one month.


Cleveland city government​

On June 10, Cleveland's city government disclosed it was forced to shut down city hall following a disruptive ransomware attack. City hall remained closed for 11 days while the staff worked to restore systems. The attack affected residents' ability to submit payments, permits and building or house applications.

CDK Global​

CDK Global experienced a damaging ransomware attack on June 18. The automotive technology provider, which currently serves 15,000 dealerships, forced most of its systems offline to contain the threat. Subsequently, the ransomware attack caused significant disruptions for downstream customers.

McLaren Health Care​

A ransomware attack on Aug. 5 significantly disrupted services at Michigan-based McLaren Health Care. The healthcare organization was forced to reschedule nonemergency and elective procedures, but the attack also affected primary and specialty care clinics as well as cancer care. Patients were asked to bring in a list of medications, printed physicians orders and a list of known allergies as the electronic medical records remained down due to the attack. McLaren operates 13 hospitals in Michigan with 28,000 employees and more than 113,000 network providers.

Port of Seattle​

On Aug. 24, the Port of Seattle in Washington began experiencing outages related to a ransomware attack. The Port of Seattle is a public agency that also oversees the Seattle-Tacoma International Airport. While the port's website was down, the airport suffered the brunt of disruptions as bag checking, check-in services, flight information displays and phone systems went down due to the attack. Some services remained down two weeks after ransomware encrypted the agency's systems.

Blue Yonder​

On Nov. 22, Arizona-based Blue Yonder disclosed it suffered a ransomware attack one day prior. The attack disrupted the supply chain management company's managed services hosted environment and led to massive fallout for downstream customers including Starbucks, Sainsbury's and Morrisons Supermarkets. Morrisons was forced to rebuild a new warehouse management system for fresh foods and produce while Sainsbury's suffered service disruptions.

Krispy Kreme​

Ransomware disrupted online ordering services for Krispy Kreme on Nov. 29. The doughnut giant disclosed the attack in an 8k filing with the SEC on Dec. 11. Krispy Kreme said it was notified of suspicious activity on its information and technology systems on Nov. 29 and subsequently initiated
an investigation, contained the threat and began remediation. In addition to online ordering, deliveries to retail and restaurant partners were also disrupted.


These are not all - just 10 of the biggest. There are many, many more! If I just wanted to report
one of these each day, I would have no trouble in doing so - and I'm just making reference to
entities within the USA!!!

Well, looking at the bright side of things, the future looks good for persons interested in pursuing
a career in Cybersecurity. Someone's gotta guard the hen house, cause the foxes sure ain't goin
away!!!
  • Wow
Reactions: precious

Email - Sent to Spam/Junk

Hello CINners,

We know that some of the factors that can/will cause email to be sent
to the Spam or Junk folder are:
- Spam trigger words:
- Suspicious links or attachments:
- Poor sender reputation:
- Incorrect email authentication:
- High volume of emails:
- Unusual email formatting:
- Low engagement rate:

Do you know of any other factors that contribute to this behavior?


Thanks CINners

Happy 2025

Chinese Hackers Accessed US Treasury Workstations

Chinese Hackers Accessed US Treasury Workstations in ‘Major’ Cybersecurity Incident​


Chinese hackers remotely accessed US Treasury Department workstations and unclassified documents
after compromising a cloud-based service operated by BeyondTrust, the department said Monday.


Happy 2025 to BeyondTrust

Virtual training instructors for evening classes

Hi All,

We are a CompTIA Platinum Partner in the UK and Australia and we offer our students a blended learning experience featuring self paced, online training alongside virtual live classroom delivery.

Our live 2 hour classrooms are there to supplement the self paced training, offer somehwere to ask questions and to offer exam prep advice. Typically, certfications are split into three, weekly, 2 hour classes taking place in the early evening of the relevant timezone.

We are looking to enhance our offering covering UK, Australia and New Zealand time zones with CompTIA Cloud+ and Data+certifications.

The position is remote.

If you would be interested or know someone that is, please email me, [email protected].

All the best

Mark Wheatland
Head of Partnerships
Learning People

Searching for Data+ and DataSys+ CompTIA Instructor Based in Chicagoland Area

We are Harper College…the college in your community.

The College was established by referendum in 1965 and opened September 1967. It is named for Dr. William Rainey Harper, a pioneer in the junior college movement in the United States and the first president of the University of Chicago. We are located in Palatine, IL.

Harper College is now one of the nation’s premier community colleges and one of the largest, serving approximately 29,000 students annually in Chicago’s northwest suburbs. The College’s academic programs prepare students for rewarding careers and for transfer to four-year universities. Harper offers associate degree and certification programs, advanced career programs, workforce training, professional development, continuing education classes, accelerated degree options for adults, and developmental education programs.

At Harper College, we are committed to fair and equitable compensation for all employees. In compliance with Illinois state law, we prioritize transparency in salary information. Our salary ranges reflect our dedication to attracting and retaining top talent while ensuring equitable pay practices. We encourage open discussions about compensation and invite you to reach out with any questions you may have regarding salary details. Harper College typically offers compensation up to the median market rate for this position. We aim to ensure our pay is competitive while aligning with both the role's requirements and the candidate's experience. To review all benefit information visit us at:

Qualifications​

Educational Requirements: Bachelor’s degree or equivalent professional experience is required. Priority will be given to those with current certification in CompTIA Data+ and DataSys+ or those who will have these certifications prior to the course start dates. A master’s degree or equivalent experience is preferred.
Experience Requirements:  Experience teaching adults and 2+ years’ experience in the field is required.

Job Description​

Part-time teaching positions are based on enrollment. Classes may be scheduled for evenings or weekends.

About the Team​

The Career and Technical Programs provide programs of study that involve a multiyear sequence of courses that integrate core academic knowledge with technical and occupational knowledge to provide students with a pathway to postsecondary education and careers.

Responsibilities​

Data Analysis Instructor. The qualified candidate must possess subject matter expertise in data analysis and have experience teaching adults. Includes curriculum and instruction to prepare students for the CompTIA Data+ and DataSys+ certification exams. Courses may be offered online, in person, or in a blended format. Instructional training includes following a course syllabus, meeting course objectives, lecture and lab instruction, and using Blackboard, assessments, and PowerPoint presentations as appropriate. The instructor will maintain and update the course curriculum as needed i.e., syllabus, textbooks, PowerPoint presentations, quizzes, etc. Must record student attendance, submit midterm and final grades as required per semester, and complete mandated training. A part of the Career and Technical Programs Division, Continuing Professional Education (CPE) offers short-term professional training leading to certification, digital badges, and industry-specific knowledge and skills.

Interested? Apply here: https://fa-eneh-saasfaprod1.fa.ocs..../?keyword=vocational+skills&mode=job-location

Matching the Right Skills to the Right Jobs

One of the most important—and often overlooked—aspects of hiring is aligning job requirements with the skills and experience necessary for success. Unfortunately, job postings are often misaligned, especially at the entry level. For example, it's not uncommon to see postings for "entry-level" cybersecurity analysts that require advanced certifications like the CISSP—certifications that typically take five or more years of industry experience to achieve and cost thousands of dollars.

Resource: Business Insider

This disconnect creates a ripple effect. It discourages qualified candidates from applying, perpetuates the talent gap, and makes it harder for companies to attract fresh talent. Worse yet, it sends a message that the employer may not truly understand what the role requires.

Why This Happens​

Hiring managers often default to "gold standard" certifications like CISSP or CISM because they’re widely recognized. But they don’t always take the time to assess whether these certifications are appropriate for the role in question. For example, the CISSP isn’t designed for someone just starting out in cybersecurity. It’s tailored for experienced professionals managing security strategies. Requiring it for an entry-level role is like asking someone applying for a learner’s permit to prove they can navigate rush hour in a semi-truck.



Read more about here:
https://www.linkedin.com/comm/pulse...2OTFkZThkOTRmYjhhZDY1OTgyZTA3ZWU3Njg0NSwxLDE=
  • Love
Reactions: precious

Filter