Logo

The model of effective security is often under a permutating name with the same emphasis: ensure the least access necessary. But as technology has evolved, so too have the solutions to manage it. So while security get more achievable, technology – and the ownership over it – has changed. Now too security must change, but utilizing what methods? Zero Trust? Least Privilege Necessary? Positive Security? This episode of Security Rules covers these topics with Joe Schreiber, a veteran of IT security and former SOC leader.