Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and patch constraints • harvest now decrypt later and crypto agility • early adopters of quantum‑resistant algorithms • futurist methods for security dec...
All content for Security Unfiltered is the property of Joe South and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and patch constraints • harvest now decrypt later and crypto agility • early adopters of quantum‑resistant algorithms • futurist methods for security dec...
Cloud, AI, and the Future of Identity Access Management
Security Unfiltered
45 minutes
1 month ago
Cloud, AI, and the Future of Identity Access Management
Send us a text Art Poghosyan shares his journey from IT security consultant to CEO of Britive, a cloud-native identity and access management company. His experience during economic downturns shaped his understanding of how cybersecurity services remain resilient through various market cycles. • Started in IT security right after completing a master's in technology risk management • Worked with early IAM solutions including LDAP directories, SSO, and authentication systems • Founded Advanced ...
Security Unfiltered
Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and patch constraints • harvest now decrypt later and crypto agility • early adopters of quantum‑resistant algorithms • futurist methods for security dec...