Enterprise Security Weekly (Audio) cover image

ESW #270 - Dan Allen & Will Lin

Enterprise Security Weekly (Audio)

00:00

Isolation Is the Third Leg of the Stool

We believe that there's really a third layer, and that is that this is where our isolation tephnologies c come into play. So why are you running that piece of content on your device in the first place? Did the user really need to open that email attachment on their on ther pc? Couldn't we move the execution of that attachment into a secure container.? We collect a lot of rich thread intelligence because we're ere modering what happens inside these containers. And so that generates a lot ofrich thread intelligence that we can then feed into your other system il give you an example.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app