Artwork

Contenuto fornito da Rich Nass, Embedded Computing Design, Rich Nass, and Embedded Computing Design. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Rich Nass, Embedded Computing Design, Rich Nass, and Embedded Computing Design o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !

Embedded Executive: Zero-Trust Architecture, Infineon

14:12
 
Condividi
 

Manage episode 448776617 series 3474446
Contenuto fornito da Rich Nass, Embedded Computing Design, Rich Nass, and Embedded Computing Design. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Rich Nass, Embedded Computing Design, Rich Nass, and Embedded Computing Design o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

The Zero Trust Architecture (ZTA) provides a new approach to cybersecurity, and outlines a great model for developers to follow. Like the name implies, you should trust no one, at least initially, and assume that all networks and traffic are potential threats.
We know that no network is ever 100% secure, but beginning with this assumption gives you the safest starting point and should reduce the risk of data breaches. ZTA is based on the principle of “least privilege,” which means that users and devices are only granted the permissions they need to perform their specific tasks.
To help explain what this means, I spoke to Steve Hanna, a Distinguished Engineer from Infineon Technologies on this week’s Embedded Executives podcast.

  continue reading

283 episodi

Artwork
iconCondividi
 
Manage episode 448776617 series 3474446
Contenuto fornito da Rich Nass, Embedded Computing Design, Rich Nass, and Embedded Computing Design. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Rich Nass, Embedded Computing Design, Rich Nass, and Embedded Computing Design o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

The Zero Trust Architecture (ZTA) provides a new approach to cybersecurity, and outlines a great model for developers to follow. Like the name implies, you should trust no one, at least initially, and assume that all networks and traffic are potential threats.
We know that no network is ever 100% secure, but beginning with this assumption gives you the safest starting point and should reduce the risk of data breaches. ZTA is based on the principle of “least privilege,” which means that users and devices are only granted the permissions they need to perform their specific tasks.
To help explain what this means, I spoke to Steve Hanna, a Distinguished Engineer from Infineon Technologies on this week’s Embedded Executives podcast.

  continue reading

283 episodi

Tutti gli episodi

×
 
Loading …

Benvenuto su Player FM!

Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.

 

Guida rapida