Tags identity authentication
Navigating the path to passwordless authentication
Not all paths to passwordless authentication are equal, but adopting an integrated approach can better prepare enterprises for a passwordless future.
How NIWC Atlantic is approaching zero trust and user policies
Naval Information Warfare Center’s Justin Hodges says modernizing data storage, retention and collection, in addition to expanding access to trusted users is important to allow the mission to be successful.
Building cyber defense strategies to counter increasingly agile attacks￼
FortiGuard Labs’ Derek Manky discusses recent attack methods that show a new level of sophistication and agility to exfiltrate data and evade defensive techniques.
Developing zero trust strategies that don’t limit access to FOIA data￼
Brian Gardner, CISO for the City of Dallas discusses the need to focus on zero trust controls that keep a balance between protecting sensitive data and data that will become public.