Remove Authentication Remove Encryption Remove Webinar
article thumbnail

Breaking the Barriers to a Password-Free Life in Enterprise: Meet SafeNet eToken Fusion NFC PIV security key

Thales Cloud Protection & Licensing

The FIDO (Fast Identity Online) standard has emerged as the gold standard in authentication technology, providing a robust framework for secure and convenient access. The newly introduced SafeNet eToken Fusion NFC PIV enables passwordless, phishing-resistant authentication across a wide range of devices.

article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. Healthcare Industry Needs a Shot in the Arm When it Comes to Data Protection: 70% experienced a breach; Less than 38% are encrypting even as threats increase

Thales Cloud Protection & Licensing

They’re counting on the fact that only 38% or less of healthcare organizations encrypt data. And while your organization may be protected with encryption and authentication tools, what about the third-party lab or billing firm that will eventually possess the data you’re responsible for protecting? Why the huge jump in value?

article thumbnail

Go Beyond FIDO Standards: Best Practices When Deploying FIDO Security Keys in Enterprise

Thales Cloud Protection & Licensing

Go Beyond FIDO Standards: Best Practices When Deploying FIDO Security Keys in Enterprise madhav Thu, 02/20/2025 - 06:22 Initially designed for the consumer market, the FIDO (Fast IDentity Online) standard aims to replace passwords with more secure authentication methods for online services. While recent versions, like FIDO2.1, standard (i.e.,

article thumbnail

Nastiest Malware 2024

Webroot

Steam the Webinar on demand HERE As we look back on the cybersecurity landscape of 2024, it’s clear that the world of digital threats continues to evolve at an alarming pace in parallel with AI. A pivotal moment came when the FBI obtained over 7,000 decryption keys, allowing victims to unlock their encrypted data for free.

Malware 108
article thumbnail

Passkeys vs. Passwords: The State of Passkeys With Remote Users

Duo's Security Blog

Remote Users The web authentication process begins when the remote user wants to connect to an application. Passkeys are created, encrypted and stored by the endpoint for the target application (also known as the relying party). Multi-factor Since password-based authentication is so vulnerable, it’s typically paired with other factors.

Passwords 133
article thumbnail

Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Security Boulevard

To get more information, check out: The full Tenable Cloud AI Risk Report 2025 The webinar 2025 Cloud AI Risk Report: Helping You Build More Secure AI Models in the Cloud on April 17, 2025 at 2 pm EDT The video Why firms need exposure management for cloud security 2 - U.K.s

Risk 69