Kristen Davis

Interesting, you mentioned zero trust, I might come back to that in a second. For you, it’s very much about this, how do we move from physical security boundaries to virtual security boundaries, be in the case of the networks or simulated virtual machines, as you spoke about, but also for our individual, it’s not about having a plastic card or a key of some kind?

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech