Security Rules

Evaluating Modern Security Models


Listen Later

The model of effective security is often under a permutating name with the same emphasis: ensure the least access necessary. But as technology has evolved, so too have the solutions to manage it. So while security get more achievable, technology – and the ownership over it – has changed. Now too security must change, but utilizing what methods? Zero Trust? Least Privilege Necessary? Positive Security? This episode of Security Rules covers these topics with Joe Schreiber, a veteran of IT security and former SOC leader.
...more
View all episodesView all episodes
Download on the App Store

Security RulesBy Security Rules

  • 5
  • 5
  • 5
  • 5
  • 5

5

2 ratings