
Sign up to save your podcasts
Or
All links and images from this episode can be found at CISO Series (https://cisoseries.com/defense-in-depth-securing-the-new-internet/)
If you could re-invent the entire Internet, starting all over again with security in mind, what would you do?
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the creator of CISO Series and Allan Alford (@AllanAlfordinTX). Our guest for this episode, Davi Ottenhimer (@daviottenheimer), who happens to be working on this project with Tim Berners-Lee at Inrupt to create a new Internet and secure it.
Thanks to this week’s podcast sponsor, Castle.
Castle is helping businesses keep customers’ online accounts safe from targeted account takeovers, automated credential stuffing, and risky user transactions. Castle’s user-centric approach to account security allows organizations to fully automate threat response and account recovery in real-time with risk-based authentication, granular access policies, and custom workflows. Learn more at www.castle.io
On this episode of Defense in Depth, you'll learn:
Creative Commons photo attribution to Joybot.
4.8
7373 ratings
All links and images from this episode can be found at CISO Series (https://cisoseries.com/defense-in-depth-securing-the-new-internet/)
If you could re-invent the entire Internet, starting all over again with security in mind, what would you do?
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the creator of CISO Series and Allan Alford (@AllanAlfordinTX). Our guest for this episode, Davi Ottenhimer (@daviottenheimer), who happens to be working on this project with Tim Berners-Lee at Inrupt to create a new Internet and secure it.
Thanks to this week’s podcast sponsor, Castle.
Castle is helping businesses keep customers’ online accounts safe from targeted account takeovers, automated credential stuffing, and risky user transactions. Castle’s user-centric approach to account security allows organizations to fully automate threat response and account recovery in real-time with risk-based authentication, granular access policies, and custom workflows. Learn more at www.castle.io
On this episode of Defense in Depth, you'll learn:
Creative Commons photo attribution to Joybot.
1,979 Listeners
365 Listeners
626 Listeners
366 Listeners
183 Listeners
1,009 Listeners
312 Listeners
413 Listeners
7,879 Listeners
166 Listeners
189 Listeners
314 Listeners
127 Listeners
43 Listeners
167 Listeners