Menu
Sign In Search Podcasts Libraries Charts People & Topics Add Podcast API Blog Pricing

David Hughes

๐Ÿ‘ค Speaker
91 total appearances

Appearances Over Time

Podcast Appearances

Technology Now
Can we protect ourselves from AI-powered cybercrime?

That's kind of the traditional way, any to any and then cutting back.

Technology Now
Can we protect ourselves from AI-powered cybercrime?

Zero trust is really starting from the other end of nothing can connect to anything and then adding rules to allow access.

Technology Now
Can we protect ourselves from AI-powered cybercrime?

So it's kind of an additive rather than subtractive approach.

Technology Now
Can we protect ourselves from AI-powered cybercrime?

Now, as you pointed out, it can be frustrating for users that want to do something new.

Technology Now
Can we protect ourselves from AI-powered cybercrime?

There may need to be a policy added for them to be able to do that.

Technology Now
Can we protect ourselves from AI-powered cybercrime?

But in terms of balancing the experience of the user with the safety of the user, I think people are realizing that in the current environment, it's much more tilted towards better to start with default deny, which is another word for zero trust.

Technology Now
Can we protect ourselves from AI-powered cybercrime?

There's always been the saying, defense in depth or multi-layer defense.

Technology Now
Can we protect ourselves from AI-powered cybercrime?

People need to be adopting all the technology they can versus putting all their eggs in one basket and thinking that there's one miracle cure.

Technology Now
Can we protect ourselves from AI-powered cybercrime?

But what I'd say is that for HPE networking, we are really focused on making sure our customers are able to use their network as part of an overall security solution, making sure that

Technology Now
Can we protect ourselves from AI-powered cybercrime?

security and networking are thought of together.

Technology Now
Can we protect ourselves from AI-powered cybercrime?

I think for many customers, they think of them as two separate things and they may be missing out a lot in terms of being able to use the network as a sensor and use the network as an enforcement point.

โ† Previous Page 5 of 5 Next โ†’