Defense in Depth cover image

Do Breaches Happen Because the Tool Fails, or the Tool Was Poorly Configured?

Defense in Depth

CHAPTER

Reasons for breaches and the importance of implementing security measures

The chapter explores the reasons for breaches and debates whether they result from tool failures or poor tool configuration, emphasizing that there are other possible causes as well. It also addresses the issue of ineffective implementation of purchased products and the significance of delivering negative feedback. The chapter concludes with a mention of implementing FIDO2 authentication to enhance security.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner