
EP99 Google Workspace Security: from Threats to Zero Trust
Cloud Security Podcast by Google
00:00
The Pros and Cons of Hardware Keys
We are not seeing or at least there are no known attacks that we have seen when the phishing keys have been used in our customer basis. Remember that when you're in the ocean, the threat vector can be different based on your depth. It's about securing your account, but there can also be other shocks out there. So make sure that you are well equipped to deal with those nightmares.
Transcript
Play full episode