The Rise Of Contextual Access And Adaptive Security

The Rise Of Contextual Access And Adaptive Security

What does it really take to move from talking about Zero Trust… to actually making it work in the real world?

Recording live from IGEL Now And Next in Miami, I caught up with John Walsh for what has now become something of a tradition, our third conversation together, and one that reflects just how much has changed in the last 12 months.

When we last spoke, the focus was on securing the edge and rethinking security through a preventative lens. This time, the conversation has expanded from IT to OT, from devices to platforms, and from theory to real-world implementation across manufacturing floors, healthcare environments, and government organizations.

John shared how IGEL is increasingly being adopted as a global standard across both IT and operational environments, bringing new challenges and new insights. From kiosks and signage on factory floors to shared workstations in hospitals, the need for persona-based and now context-aware access is becoming far more than a technical concept. It is shaping how organizations think about identity, risk, and control at scale.

We also explored how the idea of the "adaptive secure desktop" is evolving beyond traditional VDI thinking. Instead of static devices, the focus is shifting toward environments that respond dynamically to the user, their role, their location, and the level of risk in that moment. It raises an important question. How do you deliver that level of control without introducing friction for the user?

AI inevitably entered the conversation, but not in the way many might expect. Rather than focusing on features, John highlighted the acceleration of threat velocity. The time between vulnerability discovery and exploitation is shrinking rapidly, and with AI amplifying that speed, traditional detection and response models are struggling to keep up. The implication is clear. Security strategies need to shift toward prevention and control, not just reaction.

We also touched on emerging challenges around agentic AI, non-human identities, and the need to apply Zero Trust principles beyond people to machines. As organizations begin to explore these new models, questions around identity, access, and guardrails are becoming more complex and more urgent.

And throughout the conversation, one theme kept coming back and reducing complexity while increasing control. Whether it is through immutable operating systems, centralized policy enforcement, or contextual access, the goal is to simplify the environment while strengthening security outcomes.

As organizations continue their journey toward modernization, one question remains: Are we still layering new technology onto old models, or are we ready to rethink how access, identity, and control are delivered from the ground up?

What do you think, is Zero Trust finally becoming real at the endpoint, or is there still a gap between strategy and execution?

Episoder(2000)

Closing The AI Trust Gap In Customer Experience With Cyara

Closing The AI Trust Gap In Customer Experience With Cyara

How many bad customer experiences does it take before someone walks away for good? In my conversation with Amitha Pulijala, we explore why the answer might be fewer than most businesses are prepared f...

6 Apr 33min

Turning AI Ambition Into Real Business Value

Turning AI Ambition Into Real Business Value

What does it really take to move AI from endless experimentation into something that creates real business value? In this episode, I sat down with Tom Alexander, Head of Innovation and Transformation ...

5 Apr 30min

Adapting To Rising Costs And Constant Threats

Adapting To Rising Costs And Constant Threats

Is the endpoint still just a device, or has it quietly become one of the most important control points in modern enterprise security? Recording live from IGEL Now And Next in Miami, I sat down once ag...

5 Apr 18min

When Recovery Takes Weeks: The Endpoint Problem With James Millington

When Recovery Takes Weeks: The Endpoint Problem With James Millington

How long would it actually take your organization to recover every endpoint after a major cyber incident? Recording live from IGEL Now And Next in Miami, I sat down with James Millington to explore a ...

3 Apr 23min

The Convergence Of IT And OT With Matthias Haas At IGEL Now And Next

The Convergence Of IT And OT With Matthias Haas At IGEL Now And Next

What does it actually take to rethink the endpoint in a world shaped by AI, Zero Trust, and the growing convergence of IT and operational technology? Recording live from IGEL Now and Next in Miami, I ...

2 Apr 26min

How Dwelly Is Rebuilding The Rental Market With AI

How Dwelly Is Rebuilding The Rental Market With AI

How do you rebuild an entire industry that most people accept as slow, fragmented, and frustrating? In this episode, I sit down with Dan Lifshits, co-founder of Dwelly, to explore how AI is being used...

1 Apr 41min

How Meta Is Using AI To Help Businesses Connect, Create, And Compete

How Meta Is Using AI To Help Businesses Connect, Create, And Compete

How are businesses supposed to grow when technology is moving faster than regulation, customer expectations keep shifting, and AI is changing the rules in real time? In this episode, I sat down with D...

31 Mar 36min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
aftenpodden-usa
forklart
popradet
stopp-verden
det-store-bildet
fotballpodden-2
nokon-ma-ga
dine-penger-pengeradet
rss-gukild-johaug
hanna-de-heldige
lydartikler-fra-aftenposten
rss-ness
aftenbla-bla
rss-dannet-uten-piano
rss-utenrikskomiteen-med-bogen-og-grasvik
chit-chat-med-helle
rss-penger-polser-og-politikk
e24-podden