
Security operations centers: around the Hash Table.
CISO Perspectives (public)
00:00
Zero Trust
Zero trust methodologies built into our odd data centers. Some cisos have is that zero trust provides no context about specific attacks from the sense of a classic insider threat. I don't see how you get away from zero trusts as a valid strategy for defense. The challenge i have with inside a threat is that they look like it's wolfin sheeps clothing.
Transcript
Play full episode