
Do Breaches Happen Because the Tool Fails, or the Tool Was Poorly Configured?
Defense in Depth
00:00
Reasons for breaches and the importance of implementing security measures
The chapter explores the reasons for breaches and debates whether they result from tool failures or poor tool configuration, emphasizing that there are other possible causes as well. It also addresses the issue of ineffective implementation of purchased products and the significance of delivering negative feedback. The chapter concludes with a mention of implementing FIDO2 authentication to enhance security.
Play episode from 28:59
Transcript


