CISO Perspectives (public) cover image

Identity Management: around the Hash Table.

CISO Perspectives (public)

00:00

Zero Trust - Identity and Access Controls

The origins of zero trusts were really around net working, in network segmentation and things like that. In higher aird, networks have never been architected the way they have been in private sector. So when i started thinking about zero trust here at ohio state, one, i couldn't use the term zero trust, because that made people immediately go, whi you don't trust me. Secondly, i called it context aware authentication, which was a really big mouthful.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app