We’re quite interested at that use case. Our CIO Dr. Chiueh helped us to transition to a passwordless, always-verify, assume-breach architecture, which means on all levels of services configuration, I can use Linux 100% of the time collaborating with other colleagues. I think all of this is part of our demonstration of a public code approach, so that all ministries who may be considering zero trust architecture can see the value in that.

Keyboard shortcuts

j previous speech k next speech