Remove Architecture Remove Authentication Remove Webinar
article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

Still Using Passwords? Get Started with Phishing-Resistant, Passwordless Authentication Now!

Cisco Security

Going beyond the hype, passwordless authentication is now a reality. Cisco Duo’s passwordless authentication is now generally available across all Duo Editions. “ Cisco Duo simplifies the passwordless journey for organizations that want to implement phishing-resistant authentication and adopt a zero trust security strategy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Azure AD and Thales support for CBA authentication reflects the growing value of high assurance MFA

Thales Cloud Protection & Licensing

Azure AD and Thales support for CBA authentication reflects the growing value of high assurance MFA. The EDR initiative relies on Multi-factor Authentication (MFA) as a critical component to protect against cyber threats such as ransomware. Now, Azure AD users can authenticate using X.509 Thu, 03/31/2022 - 12:55.

article thumbnail

The Bridge to Zero Trust

CyberSecurity Insiders

He’ll also look at why identity and access management are the first elements you should modernize as you start your zero trust journey, and how Zero Trust Authentication will help accelerate your journey. Zero Trust , will join us and discuss the current state of zero trust.

article thumbnail

Clarity and Transparency: How to Build Trust for Zero Trust

Cisco Security

As a product marketer, I spend most of my daily existence casting about for the perfect word to use in web copy, a webinar, or video script. In the Harvard Business Review’s “Begin with Trust ”, Frances Frei and Anne Morriss describe three key drivers for trust: authenticity, logic, and empathy.

Marketing 144
article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Found Vulnerable to Basic Hacks, While New MITRE Tool Uses ML to Predict Attack Chains

Security Boulevard

Success ” (on-demand webinar) 5 - CISA issues plea to end XSS vulnerabilities Although cross-site scripting (XSS) vulnerabilities are easily preventable, software makers continue introducing them into their products, a situation that needs to stop. Maintain a comprehensive asset inventory, and keep software updated and patched.

article thumbnail

Demystifying Duo APIs: Advanced Security with Duo Integrations

Cisco Security

, testing environment, and support resources make it easy for developers to integrate Duo’s security solutions into their zero trust architecture. Auth API : This is a widely used API that enables you to add strong two-factor authentication to the authentication flow of your applications.