
EP99 Google Workspace Security: from Threats to Zero Trust
Cloud Security Podcast by Google
00:00
Hardware Keys: A Unique Value Proposition
We are seeing a steady adoption of what we call as two SV, two-step verification within our customer base. These keys essentially are phishing resistant, which means that if you are using it appropriately for your particular use cases, the propensity of a phishing attack goes much, much lower than what would have been otherwise the case.
Transcript
Play full episode