Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.There’s no succinct instruction manual for zero trust architecture, but here’s the next best thing Recent headlines about critical vulnerabilities plaguing VPNs and other legacy infrastructure are a sign that the traditional “castle-and-moat” approach to network security – perimeter-based defenses and implicit trust within the network – is going the way of the dodo. Cybercriminals are growing more so…