The recent high-profile Lapsus$ attack has made it abundantly clear that zero-trust must start with guaranteeing a user’s identity. Without this ability, physical network and authorization constraints are meaningless. The market needs to move quickly to plug the vulnerability in Zero Trust (ZT). With No Identity, there is No Zero Trust.
Aired on: Sept 22, 2022
Duration: 40 mins
Dan Thornhill, SVP, ValidSoft, Dan Miller, Lead Analyst; Derek Top, Senior Analyst, Opus Research