article thumbnail

MY TAKE: A few reasons to believe RSAC 2023’s ‘stronger together’ theme is gaining traction

The Last Watchdog

Multi-factor authentication ( MFA ) has raised the bar, but MFA alone is not enough to slow, much less stop, moderately-skilled bad actors. New security platforms that can set cloud configurations wisely, automate detection and response and manage vulnerabilities continuously are needed to form the front line of defense.

Mobile 238
article thumbnail

MY TAKE: RSAC 2023 roundup – evidence of ‘stronger together’ innovation takes shape

The Last Watchdog

Multi-factor authentication ( MFA ) has raised the bar, but MFA alone is not enough to slow, much less stop, moderately-skilled bad actors. New security platforms that can set cloud configurations wisely, automate detection and response and manage vulnerabilities continuously are needed to form the front line of defense.

Mobile 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Q&A: The lesser role VPNs now play for enterprises, SMBs — in a post-pandemic world

The Last Watchdog

However, VPN pipes have become less efficient with the rising use of personally-owed mobile devices increasing reliance on cloud-centric IT resources. LW: What about SMBs; how does a traditional VPN service fit as cloud migration deepens? LW: What are the main differences between how VPN services are delivered in the U.S.

VPN 213
article thumbnail

The Changing Face of Data Security in Federal Government

Thales Cloud Protection & Licensing

With details from our report, I also highlighted how demand for modernization, mobile payments, IoT, cloud migration and cost savings is driving the push for new technologies while increasing opportunities for threats.

article thumbnail

MY TAKE: DigiCert and Oracle partner to extend digital trust and scalable infrastructure globally

The Last Watchdog

This was all part of the Lehi, Utah-based vendor’s efforts to support enterprise cloud migration and the rise of IoT systems, which were both gaining steam. In the past, APIs mainly connected users to websites and mobile apps.

article thumbnail

Why Are We Still Separating Credential Management and Machine Identity Management?

Security Boulevard

A third (33%) of respondents said they use three or more authentication access management tools. Machine identities validate the authenticity of non-human entities connected to corporate networks. Machine identities validate the authenticity of non-human entities connected to corporate networks. Machine Identity Management.

article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

In our previous blog post , we discussed the challenges for securing IoT deployments, and how businesses and consumers benefit from authenticating and validating IoT software and firmware updates. If the authentication process isn’t secure enough, hackers could gain access to the user’s account and, from there, get their hands on the vehicle.

IoT 71