Zero Trust: Identity as the New Perimeter
This conversation covers the principles of security, the shift of identity as the new perimeter, and the transition from detection-led to trust-led security. It emphasizes the importance of assuming network compromise, focusing on identity, and denying access based on unusual behavior. Takeaways.