Cloud Security Podcast by Google cover image

EP99 Google Workspace Security: from Threats to Zero Trust

Cloud Security Podcast by Google

00:00

The Pros and Cons of Hardware Keys

We are not seeing or at least there are no known attacks that we have seen when the phishing keys have been used in our customer basis. Remember that when you're in the ocean, the threat vector can be different based on your depth. It's about securing your account, but there can also be other shocks out there. So make sure that you are well equipped to deal with those nightmares.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app