Networking 2.0: The Future of Decentralized Networking & Access Management

Networking 2.0: The Future of Decentralized Networking & Access Management

In this episode, Hosts Ron Eddings, and Jen Langdon share takeaways from Ron's RSA conversation with Colin Constable, Co-Founder and CTO at Atsign

On this show, they’ll break down Networking 2.0 and how it can serve as the next evolution for data ownership and access control. Colin and his team at Atsign have built the atProtocol®, a new open-source internet protocol that makes private and secure data sharing simple and intuitive, enabling any person, entity or thing to implement NIST Zero Trust principles into their solution.

Impactful Moments:

00:00 - Welcome

02:17 - Introducing, Colin Constable

03:42 - The Problem with the Current Internet

08:02 - The Catalyst Behind atProtocol®

11:12 - Nexus of Networking, Identity & Privacy

14:19 - From our Sponsor, Atsign

15:23 - What’s Networking 2.0?

18:54 - Internet Anonymity & Accountability

24:31 - Unique Solutions using atProtocol®

Links:

Connect with Colin Constable: https://www.linkedin.com/in/colinconstable/

Check out Atsign: https://atsign.com/

Read the atProtocol Whitepaper here:

https://atsign.com/resources/white-papers/the-atprotocol/

Check out our upcoming events: https://www.hackervalley.com/livestreams

Join our creative mastermind and stand out as a cybersecurity professional:

https://www.patreon.com/hackervalleystudio

Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

Continue the conversation by joining our Discord: https://hackervalley.com/discord

Check out our upcoming events: hackervalley.com/livestreams

Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Episoder(410)

Why MFA Isn’t the Safety Net You Think It Is with Yaamini Barathi Mohan

Why MFA Isn’t the Safety Net You Think It Is with Yaamini Barathi Mohan

Phishing didn’t get smarter, it got better at looking normal. What used to be obvious scams now blend directly into the platforms, workflows, and security controls people trust every day. In this epi...

29 Jan 32min

When Cybercrime Learned How to Make Money and Never Looked Back with Graham Cluley

When Cybercrime Learned How to Make Money and Never Looked Back with Graham Cluley

Cybersecurity didn’t start as a billion-dollar crime machine. It started as pranks, ego, and curiosity. That origin story explains almost everything that’s breaking today. Ron sits down with Graham C...

25 Jan 37min

When Automation Outruns Control with Joshua Bregler

When Automation Outruns Control with Joshua Bregler

AI doesn’t break security, it exposes where it was already fragile. When automation starts making decisions faster than humans can audit, AppSec becomes the only thing standing between scale and catas...

18 Jan 37min

The Day AI Stopped Asking for Permission with Marcus J. Carey

The Day AI Stopped Asking for Permission with Marcus J. Carey

AI didn’t quietly evolve, it crossed the line from recommendation to execution. Once agents stopped advising humans and started acting inside real systems, trust replaced experimentation and consequen...

15 Jan 33min

When AI Ships the Code, Who Owns the Risk with Varun Badhwar and Henrik Plate

When AI Ships the Code, Who Owns the Risk with Varun Badhwar and Henrik Plate

AI isn’t quietly changing software development… it’s rewriting the rules while most security programs are still playing defense. When agents write code at machine speed, the real risk isn’t velocity, ...

8 Jan 35min

Think Like a Hacker Before the Hack Happens with John Hammond

Think Like a Hacker Before the Hack Happens with John Hammond

What if the most dangerous hackers are the ones who never touch a keyboard? The real threat isn't just about stolen credentials or ransomware; it's about understanding how attackers think before they ...

1 Jan 28min

Breaking Into Banks and Bypassing Modern Security with Greg Hatcher and John Stigerwalt

Breaking Into Banks and Bypassing Modern Security with Greg Hatcher and John Stigerwalt

Three banks in four days isn't just a bragging right for penetration testers. It's a wake-up call showing that expensive security tools and alarm systems often fail when tested by skilled operators wh...

18 Des 202533min

Defending Your Cyber Systems and Your Mental Attack Surface with Chris Hughes

Defending Your Cyber Systems and Your Mental Attack Surface with Chris Hughes

When your firewall forgets to buckle up, the crash doesn’t happen in the network first, it happens in your blindspots. In this episode, Ron is joined by returning guest Chris Hughes, Co-Founder of Aqu...

11 Des 202534min

Populært innen Fakta

fastlegen
dine-penger-pengeradet
relasjonspodden-med-dora-thorhallsdottir-kjersti-idem
treningspodden
foreldreradet
dopet
merry-quizmas
jakt-og-fiskepodden
rss-strid-de-norske-borgerkrigene
sinnsyn
sovnlos
podme-bio-3
hverdagspsyken
rss-kull
gravid-uke-for-uke
tomprat-med-gunnar-tjomlid
rss-kunsten-a-leve
fryktlos
level-up-med-anniken-binz
rss-var-forste-kaffe