1. Pingback: Podcast: Passwords are dying, but they're not going anywhere | The Security Ledger

  2. The approach is in context with the environment, what you are protecting and why.
    The philosophy is still relieant on trust (including the trust of Google), secure systems/interactions and protocols (technical and business process).

    Ultimately it’s good research and will provide additional options for all of us to use in our own context – it’s not a silver bullet for all applications.

    • Right on, Derek. Totally agree. Importantly: Software Defined Perimeter is a concept that works especially well in “cloud first” environments like Google. Much harder to make it work in legacy enterprise IT environments, I’d guess!