article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

Protecting Your Universe from Third-Party Threats with Risk-Based Authentication & Verified Push

Duo's Security Blog

Risk-Based Authentication (RBA) intelligently leverages more secure forms of authentication—like verified push—to help organizations respond to risk and step-up security measures to frustrate attackers, not trusted users. How does Risk-Based authentication reduce third-party risk? But just like Ms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Sites

Duo's Security Blog

So for many IT teams, the news that tech giants are steadily embracing passkey technology is exciting. We’ve been answering these questions in this blog series by unpacking the pros and cons of passkey technology from different authentication perspectives. Nobody likes passwords. But how effective are passkeys really?

article thumbnail

The Bridge to Zero Trust

CyberSecurity Insiders

He’ll also look at why identity and access management are the first elements you should modernize as you start your zero trust journey, and how Zero Trust Authentication will help accelerate your journey. They’ll also discuss recommended steps to advance security posture. We will also feature speakers from Ping Identity and others.

article thumbnail

Five Hot Security and Privacy Topics You Need To Understand in 2022

Thales Cloud Protection & Licensing

Throughout 2021 Thales hosted several webinars whose purpose was to raise awareness on trending topics around cybersecurity and privacy. Although all webinars were a success, some stood out of the competition for various reasons. Although all webinars were a success, some stood out of the competition for various reasons.

article thumbnail

Is Artificial Intelligence Making People More Secure? Or Less?

Security Boulevard

AI can be used to monitor user behavior and make real-time decisions about whether to grant access or add step-up authentication if there is anything anomalous about the request (such as a login from an unusual timezone). If it detects a threat or anomalous behavior, its dashboard explains the decision in human-readable form. We should, too.

article thumbnail

How online retailers can boost sales completion at checkout

CyberSecurity Insiders

Earlier this summer, we hosted a webinar with our partners at Mastercard , discussing how EMV tokenization can bring convenience and security to online retailers and shoppers. The technology ensures payment information is kept up to date, while the token remains the same. Higher approval rates. Unleashing full potential .

Retail 118