Artwork

Innehåll tillhandahållet av Rich Nass, Embedded Computing Design, Rich Nass, and Embedded Computing Design. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Rich Nass, Embedded Computing Design, Rich Nass, and Embedded Computing Design eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

Embedded Executive: Zero-Trust Architecture, Infineon

14:12
 
Dela
 

Manage episode 448776617 series 3474446
Innehåll tillhandahållet av Rich Nass, Embedded Computing Design, Rich Nass, and Embedded Computing Design. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Rich Nass, Embedded Computing Design, Rich Nass, and Embedded Computing Design eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.

The Zero Trust Architecture (ZTA) provides a new approach to cybersecurity, and outlines a great model for developers to follow. Like the name implies, you should trust no one, at least initially, and assume that all networks and traffic are potential threats.
We know that no network is ever 100% secure, but beginning with this assumption gives you the safest starting point and should reduce the risk of data breaches. ZTA is based on the principle of “least privilege,” which means that users and devices are only granted the permissions they need to perform their specific tasks.
To help explain what this means, I spoke to Steve Hanna, a Distinguished Engineer from Infineon Technologies on this week’s Embedded Executives podcast.

  continue reading

284 episoder

Artwork
iconDela
 
Manage episode 448776617 series 3474446
Innehåll tillhandahållet av Rich Nass, Embedded Computing Design, Rich Nass, and Embedded Computing Design. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Rich Nass, Embedded Computing Design, Rich Nass, and Embedded Computing Design eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.

The Zero Trust Architecture (ZTA) provides a new approach to cybersecurity, and outlines a great model for developers to follow. Like the name implies, you should trust no one, at least initially, and assume that all networks and traffic are potential threats.
We know that no network is ever 100% secure, but beginning with this assumption gives you the safest starting point and should reduce the risk of data breaches. ZTA is based on the principle of “least privilege,” which means that users and devices are only granted the permissions they need to perform their specific tasks.
To help explain what this means, I spoke to Steve Hanna, a Distinguished Engineer from Infineon Technologies on this week’s Embedded Executives podcast.

  continue reading

284 episoder

Alla avsnitt

×
 
Loading …

Välkommen till Player FM

Player FM scannar webben för högkvalitativa podcasts för dig att njuta av nu direkt. Den är den bästa podcast-appen och den fungerar med Android, Iphone och webben. Bli medlem för att synka prenumerationer mellan enheter.

 

Snabbguide