CISO Perspectives (public) cover image

Security operations centers: around the Hash Table.

CISO Perspectives (public)

00:00

Zero Trust

Zero trust methodologies built into our odd data centers. Some cisos have is that zero trust provides no context about specific attacks from the sense of a classic insider threat. I don't see how you get away from zero trusts as a valid strategy for defense. The challenge i have with inside a threat is that they look like it's wolfin sheeps clothing.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app