This week, Adam and Andy talk about how to look at BYOD policies in a Zero-Trust architecture. They go over a blueprint put out by Microsoft Middle East and Africa that's a little bit older but is a great reference for anyone looking for guidance.
\n-------------------------------------------
\nYoutube Video Link: https://youtu.be/pze2b0Ix8QI
\n-------------------------------------------
\nDocumentation:
\n\n\n-------------------------------------------
\nContact Us:
\nWebsite: http://bluesecuritypod.com
\nTwitter: https://twitter.com/bluesecuritypod
\nLinkedin: https://www.linkedin.com/company/bluesecpod
\nYoutube: https://www.youtube.com/c/BlueSecurityPodcast
\nInstagram: https://www.instagram.com/bluesecuritypodcast/
\nFacebook: https://www.facebook.com/bluesecpod
\nTwitch: https://www.twitch.tv/bluesecuritypod
\n-------------------------------------------
\nAndy Jaw
\nTwitter: https://twitter.com/ajawzero
\nLinkedIn: https://www.linkedin.com/in/andyjaw/
\nEmail: andy@bluesecuritypod.com
\n-------------------------------------------
\nAdam Brewer
\nTwitter: https://twitter.com/ajbrewer
\nLinkedIn: https://www.linkedin.com/in/adamjbrewer/
\nEmail: adam@bluesecuritypod.com
\n\n--- \n\nSend in a voice message: https://podcasters.spotify.com/pod/show/blue-security-podcast/message