Remove Authentication Remove Encryption Remove Risk Remove Webinar
article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

Defining Good: A Strategic Approach to API Risk Reduction

Security Boulevard

How do we gauge how risky it is and how do we ensure that future APIs are not putting the enterprise at risk? This can not be done without major risk unless organizations have created and mandated corporate standards on what a "good" API actually is from a security standpoint. Defining and sharing what good means.

Risk 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Sites

Duo's Security Blog

We’ve been answering these questions in this blog series by unpacking the pros and cons of passkey technology from different authentication perspectives. Today, we’re focusing on how passkeys compare to passwords when it comes to authenticating on cloud sites. A separate set of passkeys are required to authenticate into each site.

article thumbnail

API Security in 2024: Imperva Report Uncovers Rising Threats and the Urgent Need for Action

Thales Cloud Protection & Licensing

With an average of 613 APIs per organization, deprecated endpoints or Broken Object Level Authorization (BOLA) heighten the potential risks facing business. The Need for Comprehensive API Security Besides the findings, Imperva offers comprehensive best practices to mitigate the risk of API vulnerabilities and strengthen business security.

Risk 87
article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Platforms

Duo's Security Blog

Be sure to tune into our webinar, The State of Passkeys in the Enterprise , on September 7th at 9am PST | 12pm EST. Passkeys on Cloud Platforms Passkeys have growing support from significant vendors. They are always encrypted end-to-end, with the private key only accessible on the user’s own devices, which prevents access by Google itself.

article thumbnail

API Security in 2024: Imperva Report Uncovers Rising Threats and the Urgent Need for Action

Security Boulevard

With an average of 613 APIs per organization, deprecated endpoints or Broken Object Level Authorization (BOLA) heighten the potential risks facing business. The Need for Comprehensive API Security Besides the findings, Imperva offers comprehensive best practices to mitigate the risk of API vulnerabilities and strengthen business security.

Risk 64
article thumbnail

Securing Containers and Multi-Cloud Operations

Thales Cloud Protection & Licensing

Knowing who and what can be trusted is a constant struggle, as malicious code, untrusted connections, and misconfiguration all lead to one thing – more risk. Several mechanisms help application and security teams to mitigate these risks, but identity is at the core. Identifying all of the “things” (e.g. 509 certificates.