Defense in Depth cover image

Do Breaches Happen Because the Tool Fails, or the Tool Was Poorly Configured?

Defense in Depth

00:00

Reasons for breaches and the importance of implementing security measures

The chapter explores the reasons for breaches and debates whether they result from tool failures or poor tool configuration, emphasizing that there are other possible causes as well. It also addresses the issue of ineffective implementation of purchased products and the significance of delivering negative feedback. The chapter concludes with a mention of implementing FIDO2 authentication to enhance security.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app