1 Comment
User's avatar
Fred's avatar

Jim, I really enjoyed listening to this conversation. I'm going to shamelessly plug my company here, Source Inc, because the secure by design zero trust data protection approach that Chuck was talking about is exactly what we are doing. Our technology stack allows protecting data at the Edge and allows sharing and propagation to other nodes in a privacy preserving way. Like Chuck said, we have to protect data as if bad actors are already on the network and listening to everything. If you're interested in know more, just ask Mic, he knows where to find me :)

Expand full comment