In this interview from Zero Trust World 2026, ThreatLocker's Christiano Guerrieri discusses storage control and visibility into where data resides, and more.Analyze Exfiltration Pathing: Identify common modern methods of data exfiltration, such as social engineering, session hijacking (cookies), and the use of authorized software for malicious purposes.Evaluate Application Permissions: Understand the risk associated with the "Full Access" model, where any software opened by a user can access everything that user has permission to see.Implement Granular Controls: Learn to apply Zero Trust principles by using storage control policies to restrict data access to only pre-approved, necessary applications.This segment is sponsored by Zero Trust World.Visit https://securityweekly.com/ztw to see all of our coverage of this event!Show Notes: https://securityweekly.com/ztw26-1
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
Related Terms
Asymmetric WarfareYou can skip this ad in 5 seconds



