Interesting, you mentioned zero trust, I might come back to that in a second. For you, it’s very much about this, how do we move from physical security boundaries to virtual security boundaries, be in the case of the networks or simulated virtual machines, as you spoke about, but also for our individual, it’s not about having a plastic card or a key of some kind?

Keyboard shortcuts

j previous speech k next speech