Tags Sponsored Content
Why combining FIDO2 and PKI provides broader enterprise-wide security
FIDO2 authentication standards are great for streamlining the user experience, but CISOs still need PKI to manage machine identity and trusted interactions across the enterprise.
Practical strategies to establish a zero-trust security environment
Splunk security strategist James Young highlights lessons learned embracing zero-trust practices internally and what agencies can learn from the experience.
Aiming for the right defense strategy against ransomware threats
Critical infrastructure sectors are increasingly exposed to ransomware threats. Security expert Steve Caimi explores key security practices for a more robust posture.
Well-funded, organized attacks require strategic counter-defense strategies
This year’s high-profile supply chain attacks underscore the gravity of lateral threats. Splunk’s Yassir Abousselham says zero trust and SOC modernization strategies are key.
How zero trust helped insulate Splunk from supply chain attack
The pervasive attack on government and commercial IT systems, via SolarWinds, highlighted the need for zero trust — and powerful analytics tools.
Military leaders on partnerships that drive modernization strategies
In a panel discussion, IT leaders from the U.S. Army, Air Force and Coast Guard share how industry partnerships are helping them speed cloud delivery during the pandemic.