<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Zero Trust Archives - Canadian Cyber</title>
	<atom:link href="https://canadiancyber.ca/tag/zero-trust/feed/" rel="self" type="application/rss+xml" />
	<link>https://canadiancyber.ca/tag/zero-trust/</link>
	<description></description>
	<lastBuildDate>Wed, 07 Jan 2026 09:52:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://canadiancyber.ca/wp-content/uploads/2022/06/cropped-android-chrome-192x192-1-32x32.png</url>
	<title>Zero Trust Archives - Canadian Cyber</title>
	<link>https://canadiancyber.ca/tag/zero-trust/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Zero Trust for SMBs: How a vCISO Can Lead Your 2026 Zero Trust Journey</title>
		<link>https://canadiancyber.ca/zero-trust-for-smbs-vciso-2025/</link>
					<comments>https://canadiancyber.ca/zero-trust-for-smbs-vciso-2025/#respond</comments>
		
		<dc:creator><![CDATA[Rafia Rizwan]]></dc:creator>
		<pubDate>Wed, 07 Jan 2026 14:00:21 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[CISA Zero Trust model]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[network segmentation]]></category>
		<category><![CDATA[NIST SP 800-207]]></category>
		<category><![CDATA[SMB cybersecurity]]></category>
		<category><![CDATA[vCISO Services]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://canadiancyber.ca/?p=4075</guid>

					<description><![CDATA[<p>Zero Trust for SMBs: How a vCISO Can Lead Your 2026 Zero Trust Journey Audience: IT leaders and executives at SMBs and mid‑market companies. Why Zero Trust now especially for smaller organizations Zero Trust is no longer a buzzword. It’s the modern baseline for securing hybrid work, SaaS, and multi‑cloud environments: “never trust, always verify.” [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://canadiancyber.ca/zero-trust-for-smbs-vciso-2025/">Zero Trust for SMBs: How a vCISO Can Lead Your 2026 Zero Trust Journey</a> appeared first on <a rel="nofollow" href="https://canadiancyber.ca">Canadian Cyber</a>.</p>
]]></description>
		
					<wfw:commentRss>https://canadiancyber.ca/zero-trust-for-smbs-vciso-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cloud Security Best Practices for a Multi‑Cloud World</title>
		<link>https://canadiancyber.ca/cloud-security-best-practices-multi-cloud-world/</link>
					<comments>https://canadiancyber.ca/cloud-security-best-practices-multi-cloud-world/#respond</comments>
		
		<dc:creator><![CDATA[Rafia Rizwan]]></dc:creator>
		<pubDate>Tue, 06 Jan 2026 14:00:44 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[CSA CCM]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Multi-cloud]]></category>
		<category><![CDATA[Well-Architected]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://canadiancyber.ca/?p=4052</guid>

					<description><![CDATA[<p>Cloud Security Best Practices for a Multi‑Cloud World (AWS &#124; Azure &#124; GCP) How to secure identity, prevent misconfigurations, encrypt data, and meet compliance across providers without slowing delivery. Security across multiple clouds feels complex: each provider has different IAM models, network constructs, logging, and defaults. The good news: AWS, Azure, and GCP publish compatible [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://canadiancyber.ca/cloud-security-best-practices-multi-cloud-world/">Cloud Security Best Practices for a Multi‑Cloud World</a> appeared first on <a rel="nofollow" href="https://canadiancyber.ca">Canadian Cyber</a>.</p>
]]></description>
		
					<wfw:commentRss>https://canadiancyber.ca/cloud-security-best-practices-multi-cloud-world/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ISO 27001 Control 5.46: Secure Authentication</title>
		<link>https://canadiancyber.ca/iso-27001-control-5-46-secure-authentication/</link>
					<comments>https://canadiancyber.ca/iso-27001-control-5-46-secure-authentication/#respond</comments>
		
		<dc:creator><![CDATA[Abdul Samad Saleem]]></dc:creator>
		<pubDate>Tue, 28 Oct 2025 15:24:42 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Access Control]]></category>
		<category><![CDATA[Azure AD]]></category>
		<category><![CDATA[canadian cyber]]></category>
		<category><![CDATA[Credential Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Identity Governance]]></category>
		<category><![CDATA[Identity Protection]]></category>
		<category><![CDATA[iso 27001]]></category>
		<category><![CDATA[ISO 27002]]></category>
		<category><![CDATA[ISO Compliance]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Microsoft Entra ID]]></category>
		<category><![CDATA[Multi-factor Authentication]]></category>
		<category><![CDATA[Secure authentication]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://canadiancyber.ca/?p=2822</guid>

					<description><![CDATA[<p>ISO 27001 Control 5.46 strengthens how users and systems verify identity. Learn how secure authentication, MFA, and Zero Trust models prevent breaches and protect your organization’s data with Canadian Cyber’s expert guidance.</p>
<p>The post <a rel="nofollow" href="https://canadiancyber.ca/iso-27001-control-5-46-secure-authentication/">ISO 27001 Control 5.46: Secure Authentication</a> appeared first on <a rel="nofollow" href="https://canadiancyber.ca">Canadian Cyber</a>.</p>
]]></description>
		
					<wfw:commentRss>https://canadiancyber.ca/iso-27001-control-5-46-secure-authentication/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
