Remove Architecture Remove Authentication Remove Webinar
article thumbnail

Still Using Passwords? Get Started with Phishing-Resistant, Passwordless Authentication Now!

Cisco Security

Going beyond the hype, passwordless authentication is now a reality. Cisco Duo’s passwordless authentication is now generally available across all Duo Editions. “ Cisco Duo simplifies the passwordless journey for organizations that want to implement phishing-resistant authentication and adopt a zero trust security strategy.

article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Azure AD and Thales support for CBA authentication reflects the growing value of high assurance MFA

Thales Cloud Protection & Licensing

Azure AD and Thales support for CBA authentication reflects the growing value of high assurance MFA. The EDR initiative relies on Multi-factor Authentication (MFA) as a critical component to protect against cyber threats such as ransomware. Now, Azure AD users can authenticate using X.509 Thu, 03/31/2022 - 12:55.

article thumbnail

The Bridge to Zero Trust

CyberSecurity Insiders

He’ll also look at why identity and access management are the first elements you should modernize as you start your zero trust journey, and how Zero Trust Authentication will help accelerate your journey. Zero Trust , will join us and discuss the current state of zero trust.

article thumbnail

Clarity and Transparency: How to Build Trust for Zero Trust

Cisco Security

As a product marketer, I spend most of my daily existence casting about for the perfect word to use in web copy, a webinar, or video script. In the Harvard Business Review’s “Begin with Trust ”, Frances Frei and Anne Morriss describe three key drivers for trust: authenticity, logic, and empathy.

Marketing 126
article thumbnail

Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT

Thales Cloud Protection & Licensing

Because IoT devices typically have limited CPU and storage capabilities, many devices transmit data in the clear and with limited authentication capabilities to a central collection unit where it can be collected, stored, analyzed and securely transmitted for additional use. For more information on this topic, please visit Venafi.

IoT 85
article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Found Vulnerable to Basic Hacks, While New MITRE Tool Uses ML to Predict Attack Chains

Security Boulevard

Success ” (on-demand webinar) 5 - CISA issues plea to end XSS vulnerabilities Although cross-site scripting (XSS) vulnerabilities are easily preventable, software makers continue introducing them into their products, a situation that needs to stop. Maintain a comprehensive asset inventory, and keep software updated and patched.