Bryan Rosensteel is cybersecurity architect, public sector, at Cisco’s Duo Security. He has more than a decade of enterprise IT and security experience, specializing in zero-trust and data-centric ...
When agencies moved to telework, IT departments had to confront the reality that their systems weren’t designed to handle a majority of employees using unmanaged devices from offsite networks. Efforts ...
Today’s credential-based attacks are much more sophisticated. Whether it’s advanced phishing techniques, credential stuffing, or even credentials compromised through social engineering or breaches of ...
In 2017, we saw a new influx of spectacular and devastating breaches. Somewhat lost in the chaos was a surprising trend amongst them -- a sharp escalation in attackers utilizing stolen, valid ...
It’s been over a year since the enforcement of the long-planned General Data Protection Regulation (GDPR) began, marking the start of a new regulatory era for data management. GDPR impacts not only ...
"Security should be effortless and empowering. With AuthX and ChromeOS, enterprises get passwordless authentication that blends security with simplicity." said Preetham Gowda, Co-Founder and President ...
Editor’s note: This image gallery accompanies our story How to use OAuth for Twitter app authentication. Click through to that story for more about coding Twitter app authentication. Workflow of a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results