
Shopping during wartime? Focus, people.
CyberWire Daily
00:00
Introduction
This chapter discusses the challenges of securing on-prem apps with modern identity and the importance of addressing legacy tech debt. It also covers topics such as identity orchestration, supply chain threats, reset malware, and breaches in Google Workspace.
Play episode from 00:00
Transcript


