Player FM 앱으로 오프라인으로 전환하세요!
Why Zero Trust Isn’t the Answer, but Full End-to-End Encryption is with Wire CTO, Alan Duric
Manage episode 281590426 series 2424654
Let's be frank. Security and the steps we take to protect ourselves are never top-of-mind. In fact, most users tend to operate under the mindset that bad things happen to other people and companies, never hitting too close to home. Until it does… Maybe it’s an email you click on, or a message that contains sensitive information you pass along to a coworker that ends up in an unsecured inbox. Regardless of the method or point of entry,, bad actors, or hackers will eventually attack if and when they can.
“More and more people go into it with the same logic as when people are buying burglar alarms for [their] home. It usually sells greatly when a home in your neighborhood gets broken into. You hear about it and then say, ‘Maybe I should actually protect myself.’ Whenever something like that happens, then those circles start to resonate with it just unfortunately, they need to get burned in order to learn about it.”
Alan Duric isn’t one of those kinds of people though. Alan is the CTO and COO of Wire, and he lives with three key terms always top of mind: Security, end-to-end encryption and prevention. On this episode of IT Visionaries, Alan discusses some of the leading trends happening in the security space — including addressing the age-old issue of how users should be more proactive and less reactive. Plus, Alan details why email continues to be the most troubling form of communication.
Main Takeaways
- You are The Weakest Link, Goodbye!: Despite all the forms of cybersecurity, email attacks still remain the weakest link because it is tough to regulate and prevent outside actors from infiltrating a system. Instead, passing sensitive information back and forth through email, consider using encryption-protected messaging services.
- A Little Proactive and Less Reactive: The time is now for companies to take a hard look at how they are protecting themselves and evaluate all options. With various forms of security, including zero trust, encryption, etc. One of the biggest problems when it comes to security understanding the risk vs reward factor.
- So, Can you Hack this? One of the leading benefits of full end-to-end encryption is the ability to protect every message and every video conference — sending or receiving — from being attacked. When each individual form of communication is encrypted with its own unique key, it’s as if that message is being protected inside its own individual fortress.
---
IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform
--
This episode of IT Visionaries is brought to you by Meter - the company building better networks. Businesses today are frustrated with outdated providers, rigid pricing, and fragmented tools. Meter changes that with a single integrated solution that covers everything wired, wireless, and even cellular networking. They design the hardware, write the firmware, build the software, and manage it all so your team doesn't have to.
That means you get fast, secure, and scalable connectivity without the complexity of juggling multiple providers. Thanks to meter for sponsoring. Go to meter.com/itv to book a demo.
---
IT Visionaries is made by the team at Mission.org. Learn more about our media studio and network of podcasts at mission.org.
Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
508 에피소드
Manage episode 281590426 series 2424654
Let's be frank. Security and the steps we take to protect ourselves are never top-of-mind. In fact, most users tend to operate under the mindset that bad things happen to other people and companies, never hitting too close to home. Until it does… Maybe it’s an email you click on, or a message that contains sensitive information you pass along to a coworker that ends up in an unsecured inbox. Regardless of the method or point of entry,, bad actors, or hackers will eventually attack if and when they can.
“More and more people go into it with the same logic as when people are buying burglar alarms for [their] home. It usually sells greatly when a home in your neighborhood gets broken into. You hear about it and then say, ‘Maybe I should actually protect myself.’ Whenever something like that happens, then those circles start to resonate with it just unfortunately, they need to get burned in order to learn about it.”
Alan Duric isn’t one of those kinds of people though. Alan is the CTO and COO of Wire, and he lives with three key terms always top of mind: Security, end-to-end encryption and prevention. On this episode of IT Visionaries, Alan discusses some of the leading trends happening in the security space — including addressing the age-old issue of how users should be more proactive and less reactive. Plus, Alan details why email continues to be the most troubling form of communication.
Main Takeaways
- You are The Weakest Link, Goodbye!: Despite all the forms of cybersecurity, email attacks still remain the weakest link because it is tough to regulate and prevent outside actors from infiltrating a system. Instead, passing sensitive information back and forth through email, consider using encryption-protected messaging services.
- A Little Proactive and Less Reactive: The time is now for companies to take a hard look at how they are protecting themselves and evaluate all options. With various forms of security, including zero trust, encryption, etc. One of the biggest problems when it comes to security understanding the risk vs reward factor.
- So, Can you Hack this? One of the leading benefits of full end-to-end encryption is the ability to protect every message and every video conference — sending or receiving — from being attacked. When each individual form of communication is encrypted with its own unique key, it’s as if that message is being protected inside its own individual fortress.
---
IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform
--
This episode of IT Visionaries is brought to you by Meter - the company building better networks. Businesses today are frustrated with outdated providers, rigid pricing, and fragmented tools. Meter changes that with a single integrated solution that covers everything wired, wireless, and even cellular networking. They design the hardware, write the firmware, build the software, and manage it all so your team doesn't have to.
That means you get fast, secure, and scalable connectivity without the complexity of juggling multiple providers. Thanks to meter for sponsoring. Go to meter.com/itv to book a demo.
---
IT Visionaries is made by the team at Mission.org. Learn more about our media studio and network of podcasts at mission.org.
Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
508 에피소드
모든 에피소드
×플레이어 FM에 오신것을 환영합니다!
플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.