As identity sprawl grows, Optiv + ClearShark’s Michael Saintcross says cybersecurity leaders must pivot from traditional ICAM strategies to solutions that offer granular control and "zero standing…
FIDO2 authentication standards are great for streamlining the user experience, but CISOs still need PKI to manage machine identity and trusted interactions across the enterprise.
Renata Spinks speaks Jan. 28, 2020, at the Zero Trust Security Summit presented by Duo Security and produced by FedScoop and CyberScoop. (Scoop News Group)
The CIA hacking tools called Gyrfalcon and BothanSpy, as described in documents released by anti-secrecy group WikiLeaks, are "effective, but surprisingly unsophisticated," according to Tatu Ylonen.