The zero trust security framework can protect sensitive data from evolving cyber threats, says Frank Domizio.
authentication
Frank Domizio explains how AI is becoming increasingly popular within the realm of cybersecurity, noting the applications of this technology.
Cybersecurity analyst Robert Wood explains how secure defaults save time and energy for engineers and development teams.
Doing things the way they’ve always been done is never a good strategy where technology is concerned, and security is no exception, writes Robert Wood.
Driving down the IAM environment’s complexity should be a major priority for all organizations, especially given the common problem of attracting and retaining technical talent.
In Ep. 30, Chris Hughes reviews the recent phishing campaign that affected more than 130 companies and explains how hardware-based tokens and other modern SaaS security solutions can help.
Security teams should consider these key questions when evaluating identity and access management (IAM) tools.
The embrace of passwordless doesn’t guarantee a future free of data breaches and account compromises but it does introduce a more secure method of authentication for users.