![Lipstick on the Rim podcast artwork](https://cdn.player.fm/images/36353102/series/xCZoNvzVfGikvCeg/32.jpg 32w, https://cdn.player.fm/images/36353102/series/xCZoNvzVfGikvCeg/64.jpg 64w, https://cdn.player.fm/images/36353102/series/xCZoNvzVfGikvCeg/128.jpg 128w, https://cdn.player.fm/images/36353102/series/xCZoNvzVfGikvCeg/256.jpg 256w, https://cdn.player.fm/images/36353102/series/xCZoNvzVfGikvCeg/512.jpg 512w)
![Lipstick on the Rim podcast artwork](/static/images/64pixel.png)
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/
Want to listen to other episodes? www.Federaltechpodcast.com
Federal technology leaders operate in a confusing world. On the one hand, they must grant access to data that is needed by users; on the other hand, they must comply with security requirements that severely restrict that access.
Craig Mueller from Varonis offers a solution: efficient data management will ensure that all information will be carefully categorized to allow this razor’s edge of operation. The approach will allow for a concept called “complete coverage.”
“Complete coverage extends to everything in the hybrid cloud as well as legacy systems.
During the interview, Craig Mueller describes a concept called Data Security Posture Management. Essentially, this process allows for complete coverage, governance, and user analytics.
Many do not realize that AI tools crawl a network and assemble as much as they can. In a federal application, there may be information that is not categorized correctly and should not be allowed to be scanned.
This is a classic example of data that gives the ability to share too easily.
Proper organization of data, both structured and unstructured, will all the balancing game of access and security to be deployed and scaled.
215集单集
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/
Want to listen to other episodes? www.Federaltechpodcast.com
Federal technology leaders operate in a confusing world. On the one hand, they must grant access to data that is needed by users; on the other hand, they must comply with security requirements that severely restrict that access.
Craig Mueller from Varonis offers a solution: efficient data management will ensure that all information will be carefully categorized to allow this razor’s edge of operation. The approach will allow for a concept called “complete coverage.”
“Complete coverage extends to everything in the hybrid cloud as well as legacy systems.
During the interview, Craig Mueller describes a concept called Data Security Posture Management. Essentially, this process allows for complete coverage, governance, and user analytics.
Many do not realize that AI tools crawl a network and assemble as much as they can. In a federal application, there may be information that is not categorized correctly and should not be allowed to be scanned.
This is a classic example of data that gives the ability to share too easily.
Proper organization of data, both structured and unstructured, will all the balancing game of access and security to be deployed and scaled.
215集单集
Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。