Remove Authentication Remove Encryption Remove Technology Remove Webinar
article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Sites

Duo's Security Blog

So for many IT teams, the news that tech giants are steadily embracing passkey technology is exciting. We’ve been answering these questions in this blog series by unpacking the pros and cons of passkey technology from different authentication perspectives. Nobody likes passwords. But how effective are passkeys really?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Five Hot Security and Privacy Topics You Need To Understand in 2022

Thales Cloud Protection & Licensing

Throughout 2021 Thales hosted several webinars whose purpose was to raise awareness on trending topics around cybersecurity and privacy. Although all webinars were a success, some stood out of the competition for various reasons. Although all webinars were a success, some stood out of the competition for various reasons.

article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Platforms

Duo's Security Blog

Be sure to tune into our webinar, The State of Passkeys in the Enterprise , on September 7th at 9am PST | 12pm EST. Passkeys on Cloud Platforms Passkeys have growing support from significant vendors. They are always encrypted end-to-end, with the private key only accessible on the user’s own devices, which prevents access by Google itself.

Passwords 100
article thumbnail

Organizations Struggle with Cloud Security in the Post Digital Transformation Era – Highlights from our 2020 Data Threat Report-Global Edition

Thales Cloud Protection & Licensing

In previous years, we have discussed the efforts of businesses to digitally transform their processes to maintain or gain a competitive advantage and many of these transformative technologies involves moving to the cloud. Sage advice: encrypt everything. We are living in a multi-cloud world.

article thumbnail

3 Ways to Protect Smart Devices from Criminal Exploits

Thales Cloud Protection & Licensing

Instead, in today’s IoT landscape, we need additional authentication layers at the gadget level to ensure any connecting Smart Devices are trusted using certificates and keys – which are infinitely more difficult for a hacker to bypass or imitate – when attempting a break-in.

article thumbnail

Remote Working One Year On: What the Future Holds for Cybersecurity

Security Boulevard

Managed File Transfer (MFT) solutions are a principal area of investment and have assumed a new importance as a technology that allows the safe transfer of files, both inside and outside an organization. In terms of technology, this means providing the best software tools to enable your remote workforce to collaborate securely.