Podcast: Play in new window | Download
Subscribe: Apple Podcasts | RSS
TechSpective Podcast Episode 111
Identity plays a pivotal role for cybersecurity. Threat actors have a variety of tools and methods to crack and compromise credentials, which is why many attacks are–from the perspective of cyber defense–inside attacks. They are executed using valid credentials that have authorization to access or do the things they do. The crux of the issue comes down to both protecting identity data and impeding the ability of threat actors to infiltrate the network using hacked or stolen credentials. However, it is equally important to limit the scope of damage from a successful attack by ensuring that accounts and devices don’t have authorization to access systems, applications, or data they don’t need to.
Threat actors have evolved and adapted to a point where multifactor authentication and the legacy approach to identity and access management is no longer good enough. It isn’t just about granting or revoking access–but ensuring that users and devices have access to what they need only when they need it–the right access at the right t time to get the job done. Alex Bovee, CEO of ConductorOne, shares his thoughts on the subject in this episode of the TechSpective Podcast.
Check out the full episode for our discussion of the future of identity and access management, the importance of least privilege access to limit the blast radius of a successful attack, and why Alex was driven to launch a new company to address these challenges.
The podcast itself is audio-only, but the video of our conversation is also available on YouTube if you prefer:
Please ask questions and share your thoughts on the topic in the comments below. Also, please subscribe to the TechSpective Podcast through your favorite podcast platform and share the podcast with your peers and friends.
If you enjoy the podcast, I would also be grateful if you could take 2 minutes to rate and review the podcast on iTunes or wherever you listen.
- Navigating the Future of Secure Code Signing and Cryptography - December 20, 2024
- The Rise of Agentic AI: How Hyper-Automation is Reshaping Cybersecurity and the Workforce - December 20, 2024
- Exploring the Evolution of Cybersecurity Marketing - December 18, 2024