Image of a microphone for a podcast series
  • Sponsored

Tackling AI-powered threats with zero trust and least privilege access

Achieving zero-trust security that blocks unauthorized software execution and ensures least-privilege access is critical for government IT professionals grappling with an evolving threat landscape. It also requires a fundamental shift in perspective, argues a leading endpoint protection platform provider.

“Rather than trying to block everything that’s bad, you change the paradigm,” says Danny Jenkins. the CEO and co-founder of ThreatLocker, in a new podcast interview for CyberScoop. “You only allow what is needed in your environment and block everything else.”

For instance, AI-powered malware poses a significant challenge, as it can bypass traditional security measures. Implementing least privilege access, particularly at the application level, is a key component in this fight.

This application whitelisting approach involves carefully defining which software can run on a system. This effectively prevents malicious software from executing — even if it’s previously unknown.

“Malware is just software,” says Jenkins. “The only difference between good software and bad software is the intent in which it was created.”

While implementing a “block by default” strategy might seem daunting, organizations can overcome challenges through careful planning and the right tools. Solutions like ThreatLocker can help identify and learn the applications currently running in an environment, as well as manage updates and dependencies.

“We’re really saying, ‘Hey, we’re going to allow you to run software — we’re going to deal with the updates and what dependencies are required for the updates — and everything else gets blocked,’” explains Jenkins.

In addition, Jenkins says organizations can significantly reduce their attack surface by focusing on least privilege access. This approach is crucial for a successful zero-trust strategy, especially in government IT environments where sensitive data is often at stake.

“Zero trust is very, very simple,” says Jenkins. “Only give access where access is required. It’s not a completion; it’s really a mindset of where your goal is only giving someone what they need and nothing else.”

By understanding and implementing least privilege access for applications, government IT professionals can safeguard critical data against the evolving threat landscape.

Listen to the full podcast conversation on CyberScoop. Learn more about how ThreatLocker helps government agencies protect their credibility and sensitive data.