Remote access, Hardware Security, Configuration management, Zero trust

SWVHSC: Put Zero Trust in Your Devices – John Loucaides – ESW #193

August 12, 2020

 

 

 

Sponsored By

 

 

sponsor
Visit https://securityweekly.com/eclypsium for more information!

 

The recent shift to a remote work environment has created new challenges for many businesses and government institutions with profound impacts on organizational security models. Users are no longer protected by the many layers of security found on-premise in the corporate network. Organizations must adapt security policies to support a massive influx of inbound connections. Security teams must consider how to adapt core security concepts like Zero Trust to include remote work environments that include corporate laptops, BYOD devices, and home networking gear. Join our conversation as we discuss how much trust you can put in your devices as well as what organizations are doing to assess and verify device integrity down to the firmware and hardware level. Eclypsium will also discuss the #BootHoleVulnerability research they disclosed last week.

This segment is sponsored by Eclypsium.

Visit https://securityweekly.com/eclypsium to learn more about them!

To learn more about securing devices down to the firmware and hardware level, visit: https://eclypsium.com/ Visit https://www.securityweekly.com/esw for all the latest episodes!

Full Episode Show Notes

SWVHSC: Put Zero Trust in Your Devices

None

Hosts

[caption id="attachment_210" align="alignleft" width="120"]Matt Alderman Matt Alderman - CEO[/caption] [caption id="attachment_210" align="alignleft" width="120"]Paul Asadoorian Paul Asadoorian - Founder & CTO[/caption]

Guests

[caption id="attachment_210" align="alignleft" width="120"]John Loucaides John Loucaides - VP of Research & Development[/caption]

Announcements

  • Visit https://securityweekly.com/webcasts to see what we have coming up! Learn about Rapid7’s Findings from the National Internet Cloud Exposure Report on August 13th and How to Create and Run a Conference, from the geniuses behind Layer8 Conference and Wild West Hackin Fest on August 19th! Our next technical training on August 27th will teach you about BootHole, SIGRed and SMBleed…Best Practices To Prioritize And Remediate Now! Or visit securityweekly.com/ondemand to view our previously recorded webcasts!

[audio src="http://traffic.libsyn.com/sw-all/ESW_193_-_John_Lucaides_Eclypsium-0_converted.mp3"]

prestitial ad