Tags identity authentication

Navigating the path to passwordless authentication

by Yves Audebert

Not all paths to passwordless authentication are equal, but adopting an integrated approach can better prepare enterprises for a passwordless future.

How NIWC Atlantic is approaching zero trust and user policies

by CyberScoop Staff

Naval Information Warfare Center’s Justin Hodges says modernizing data storage, retention and collection, in addition to expanding access to trusted users is important to allow the mission to be successful.

Building cyber defense strategies to counter increasingly agile attacks

by CyberScoop Staff

FortiGuard Labs’ Derek Manky discusses recent attack methods that show a new level of sophistication and agility to exfiltrate data and evade defensive techniques.

Developing zero trust strategies that don’t limit access to FOIA data

by CyberScoop Staff

Brian Gardner, CISO for the City of Dallas discusses the need to focus on zero trust controls that keep a balance between protecting sensitive data and data that will become public.

TwitterFacebookLinkedInRedditGmail