Tags Sponsored Content

Why combining FIDO2 and PKI provides broader enterprise-wide security

by CyberScoop Staff • 3 weeks ago

FIDO2 authentication standards are great for streamlining the user experience, but CISOs still need PKI to manage machine identity and trusted interactions across the enterprise.

Practical strategies to establish a zero-trust security environment

by CyberScoop Staff • 1 month ago

Splunk security strategist James Young highlights lessons learned embracing zero-trust practices internally and what agencies can learn from the experience.

Aiming for the right defense strategy against ransomware threats

by Steve Caimi • 2 months ago

Critical infrastructure sectors are increasingly exposed to ransomware threats. Security expert Steve Caimi explores key security practices for a more robust posture.

Well-funded, organized attacks require strategic counter-defense strategies

by CyberScoop Staff • 2 months ago

This year’s high-profile supply chain attacks underscore the gravity of lateral threats. Splunk’s Yassir Abousselham says zero trust and SOC modernization strategies are key.

How zero trust helped insulate Splunk from supply chain attack

by CyberScoop Staff • 3 months ago

The pervasive attack on government and commercial IT systems, via SolarWinds, highlighted the need for zero trust — and powerful analytics tools.

Military leaders on partnerships that drive modernization strategies

by CyberScoop Staff • 7 months ago

In a panel discussion, IT leaders from the U.S. Army, Air Force and Coast Guard share how industry partnerships are helping them speed cloud delivery during the pandemic.

TwitterFacebookLinkedInRedditGmail