article thumbnail

What Were the Best Cybersecurity Webinars of 2021?

CyberSecurity Insiders

So, we’ve compiled the highest rated, ranked by your peers, (ISC)² cybersecurity webinars from 2021. Our webinars have maintained consistent popularity and have have increased in viewership by more than 70% year-over-year growth this year. ISC)² members can receive CPE credits automatically for viewing webinars.

article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Q4 Product Roadmap Webinar Recap

Security Boulevard

The post Q4 Product Roadmap Webinar Recap appeared first on JumpCloud. The post Q4 Product Roadmap Webinar Recap appeared first on Security Boulevard. JumpCloud will integrate endpoints across services, bring new automations to bear, and serve as a central lifecycle and governance platform.

article thumbnail

Authentication Within FSI: Now and Next

Security Boulevard

Join our founder Simon Moffatt along with Michael Rothschild VP of Product Marketing at HYPR on August 22nd, where they'll be taking a look at authentication within the global financial services industry. The post Authentication Within FSI: Now and Next appeared first on The Cyber Hut.

article thumbnail

Protecting Your Universe from Third-Party Threats with Risk-Based Authentication & Verified Push

Duo's Security Blog

Risk-Based Authentication (RBA) intelligently leverages more secure forms of authentication—like verified push—to help organizations respond to risk and step-up security measures to frustrate attackers, not trusted users. How does Risk-Based authentication reduce third-party risk?

article thumbnail

Hardware-based PKI provides strong passwordless authentication

Thales Cloud Protection & Licensing

Hardware-based PKI provides strong passwordless authentication. The need to manage users and authenticators in a secure and timely way is important with any PKI-based deployment. Certificate-based and software authentication solutions and OTP. Simply put, strong authentication helps verify data security. PKI Management.

article thumbnail

FIDO - Leading the Zero Trust Passwordless Authentication Evolution

Thales Cloud Protection & Licensing

FIDO - Leading the Zero Trust Passwordless Authentication Evolution. A Zero Trust approach starts with Multi-Factor Authentication (MFA). The Role of Passwordless Authentication. Passwordless authentication was developed to combat phishing attacks, a crucial risk that cannot be ignored. Tue, 08/16/2022 - 06:32.