Главная
Study mode:
on
1
Intro
2
Review
3
Network Security
4
Traditional Security
5
What is being monitored
6
What about you
7
Everything else
8
Malicious devices
9
Password vs passphrase
10
Wireless devices
11
No perimeter
12
We dont care
13
Data exfiltration
14
Rooting
Description:
Explore the evolving landscape of network security in this 51-minute conference talk from BSides San Francisco 2015. Delve into the shift from traditional security models to modern approaches, examining the challenges posed by the disappearance of the network perimeter. Learn about the importance of monitoring, the role of wireless devices, and the risks associated with malicious devices. Discover the significance of using passphrases instead of passwords and understand the implications of data exfiltration. Gain insights into the concept of "rooting" and how it impacts security measures. Understand why traditional security boundaries are becoming obsolete and how organizations are adapting to protect their assets in an increasingly interconnected world.

Blink - The Network Perimeter is Gone

Add to list
00:00
-01:02