Audrey Tang

So, by going to three different vendors in biometric, in device, and in behavior, we can actually detect the attack attempts that may have breached one or even two of the three factors, but still mitigate so that it does not laterally move, meaning that it doesn’t spread to other systems. And then we can share the threat indicators with friendly peoples.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech