
Get 24/7 incident response assistance from our global team
- APAC: +65 3159 4398
- EU & NA: +31 20 890 55 59
- MEA: +971 4 540 6400
Get 24/7 incident response assistance from our global team
Please review the following rules before submitting your application:
1. Our main objective is to foster a community of like-minded individuals dedicated to combatting cybercrime and who have never engaged in Blackhat activities.
2. All applications must include research or a research draft. You can find content criteria in the blog. Please provide a link to your research or research draft using the form below.

Zero Trust is no longer just a buzzword; it may very well be our new reality. Perimeter-based security models started becoming obsolete long before the pandemic confirmed their fate. Companies are no longer confined to the walls of a building but rather are spread across clouds, locations, and borders. This is no fault of any one company; this is simply one of the results of modernization and globalization.
So, if a castle-and-moat model is no longer viable, what can replace it? The answer is a concept that has been around for more than a decade: Zero Trust. We’ve all heard about it, maybe even dismissed it as impossible. But the fact remains that its novel idea of assuming every element within an infrastructure is hostile until proven otherwise is the answer to today’s amorphous networks.