Cloud Security Podcast by Google cover image

EP99 Google Workspace Security: from Threats to Zero Trust

Cloud Security Podcast by Google

00:00

Hardware Keys: A Unique Value Proposition

We are seeing a steady adoption of what we call as two SV, two-step verification within our customer base. These keys essentially are phishing resistant, which means that if you are using it appropriately for your particular use cases, the propensity of a phishing attack goes much, much lower than what would have been otherwise the case.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app