![]() There was at least one meeting a week for a year, maybe, and periodic briefings. What I found it to be was phenomenally collaborative. Kindervag: Well, it was a massive honor to, first of all, get appointed, asked and then appointed. VB: How did the experience of contributing to the President’s National Security Telecommunications Advisory Committee (NSTAC) Draft on Zero Trust and Trusted Identity Management help identify critical areas where the government can improve its security posture on zero trust? And I said this to somebody in a government agency: “What if somebody puts a gun to my head and they take over the keyboard? Do they become me? Is there a transference of identity to that individual? Because suddenly that abstraction breaks down.” In the room where it happened ![]() Somebody comes in, puts a gun to my head and makes me get off the keyboard and they start typing. It’s an assertion that the packets being generated by this MacBook, the other end of that is John typing or generating the packets through his webcam and his microphone. So think about SAML (Security Assertion Markup Language). So this anthropomorphization that John Kindervag is on the network can’t be assumed. ![]() Kindervag: Yeah, I think every identity is a machine identity. VentureBeat: How can organizations adopt zero trust to protect the fast-growing number of machine identities? How can machine-to-machine transactions be more compliant with zero trust and least privileged access? ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |