Remove Architecture Remove Authentication Remove Technology Remove Webinar
article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

The Bridge to Zero Trust

CyberSecurity Insiders

He’ll also look at why identity and access management are the first elements you should modernize as you start your zero trust journey, and how Zero Trust Authentication will help accelerate your journey. They’ll also discuss recommended steps to advance security posture. We will also feature speakers from Ping Identity and others.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Intro to Phishing: How Dangerous Is Phishing in 2023?

Duo's Security Blog

A major leading research and teaching institution, the University was looking for a multi-factor authentication (MFA) solution that could integrate with existing IT architecture and be rolled out easily across campus. Moreover, they were incredibly complex to integrate with the University’s technology stack.

article thumbnail

Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT

Thales Cloud Protection & Licensing

Because IoT devices typically have limited CPU and storage capabilities, many devices transmit data in the clear and with limited authentication capabilities to a central collection unit where it can be collected, stored, analyzed and securely transmitted for additional use. How safely are you managing machine identities for IoT devices?

IoT 86
article thumbnail

Herjavec Group Wins 4 Cyber Defense Magazine Global InfoSec Awards

Herjavec Group

As the global leader in Managed Security Services, Herjavec Group has demonstrated the innate ability to combine the power of technology, AI, and automation with human intelligence to optimize the IT security monitoring, incident detection, and incident response times of enterprises globally. HG Mana ged Detection & Response (MDR) .

InfoSec 52
article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. An integration with Cigent Technology is now available for Secure Endpoint customers to integrate with. Kenna has a healthy 3rd Party ecosystem of technology partners.

article thumbnail

Still Using Passwords? Get Started with Phishing-Resistant, Passwordless Authentication Now!

Cisco Security

Going beyond the hype, passwordless authentication is now a reality. Cisco Duo’s passwordless authentication is now generally available across all Duo Editions. “ Cisco Duo simplifies the passwordless journey for organizations that want to implement phishing-resistant authentication and adopt a zero trust security strategy.