Remove Authentication Remove Blog Remove Digital transformation
article thumbnail

Recapping RSAC 2021: Cisco’s Keynote, Zero Trust Deployment & Passwordless Authentication

Cisco Security

One key security trend that has enabled this rapid digital transformation for organizations is a zero trust architecture. Zero Trust architecture falls apart without strong authentication to verify user identities. Zero Trust architecture falls apart without strong authentication to verify user identities. In Conclusion.

article thumbnail

RSAC 2019 Blog Series: Taking the Risk out of Digital Transformation: RSAC 2019’s Quest for Delivering “Better”

Thales Cloud Protection & Licensing

However, in an attempt to be “better” many organizations have leaned heavily on emerging technologies such as cloud, blockchain and IoT – aka digital transformation. However, as digital transformation proves “better” for many aspects, it isn’t proving to be better for security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why You Need a Root of Trust to be an eIDAS Trust Service Provider

Security Boulevard

We have come a long way in the digital transformation journey. In little over a decade, identification and authentication solutions, The post Why You Need a Root of Trust to be an eIDAS Trust Service Provider appeared first on Entrust Blog.

article thumbnail

Organizations Struggle with Cloud Security in the Post Digital Transformation Era – Highlights from our 2020 Data Threat Report-Global Edition

Thales Cloud Protection & Licensing

This year the report focuses on the post digital transformation era. In previous years, we have discussed the efforts of businesses to digitally transform their processes to maintain or gain a competitive advantage and many of these transformative technologies involves moving to the cloud.

article thumbnail

GUEST ESSAY: Five stages to attain API security — and mitigate attack surface exposures

The Last Watchdog

APIs (Application Programming Interfaces) play a critical role in digital transformation by enabling communication and data exchange between different systems and applications. So, how can you ensure your API security is effective and enable your digital transformation?

article thumbnail

Level Up Your Security: Embrace Passkeys and Phishing-Resistant 2FA

Thales Cloud Protection & Licensing

Learn why these modern security practices are essential for safer, stronger authentication. As we celebrate Change Your Password Day on February 1st and 2FA Day on February 2nd, theres no better time to rethink and upgrade how we protect our digital lives. Passwordless authentication. So, whats the alternative? Why Use Passkeys?

article thumbnail

Breaking the Barriers to a Password-Free Life in Enterprise: Meet SafeNet eToken Fusion NFC PIV security key

Thales Cloud Protection & Licensing

The FIDO (Fast Identity Online) standard has emerged as the gold standard in authentication technology, providing a robust framework for secure and convenient access. The newly introduced SafeNet eToken Fusion NFC PIV enables passwordless, phishing-resistant authentication across a wide range of devices.