26. Trusted Computing has a Negative Connotation
Listen now
Description
On today's episode of Cybersecurity Hot Takes, Founding Engineer Nelson Melo brings up trusted computing. Having been taught the term in different ways, the crew explores if trusted computing is good or bad, and where we see it going in the next few years in the IT, infosec, and cybersecurity realms! Follow Beyond Identity: twitter.com/beyondidentity linkedin.com/company/beyond-identity-inc Website: beyondidentity.com Send any voice submissions to [email protected] Informal security chat with Beyond Identity's CTO Jasson Casey, Founding Engineer Nelson Melo, and VP of Global Sales Engineering Husnain Bajwa and our host Marketing Empress Reece Guida. Join us for the good, the ugly, and the unexplored in the cybersecurity space. Chat topics include MFA, authentication, passwordless solutions, and how Beyond Identity is utilizing asymmetric cryptography to create the first unphishable multi-factor authentication on the planet. --- Send in a voice message: https://anchor.fm/beyondidentity/message
More Episodes
Join us as we discuss the recent launch of Meta's new social media app, Threads, and examine the choice to utilize traditional username and password authentication. We explore the limitations and vulnerabilities of this outdated authentication method and how it can frustrate users with its...
Published 01/03/24
Published 01/03/24
The podcast crew is back! On this episode of the Cybersecurity Hot Takes podcast we are joined by CISO, Sam Curry from Zscaler. Sam takes us through a conversation of Negative Trust, and how we can evolve our zero trust security architecture to go both ways. Follow Beyond...
Published 06/29/23