Entrust Webcast: Leveraging Mobile Devices for Strong Authentication
Security-conscious organizations and enterprises are finding it increasingly difficult to secure various mobile devices that flood corporate networks. With handheld devices heavily leveraged to access corporate networks and sensitive information, CIOs must consider their authentication strategies for any number of evolving channels.
What’s on CISO’s minds?
A few weeks ago, I attended an InfoSec conference in Brussels, Belgium – “Enterprise Security Exchange”.
Overall, it was a great conference, as I was able to have great discussions with CISO’s of many known and respected global organizations.
A Platform Approach to Authentication. . . ‘cause you just can’t keep changing things out!
Last week I was pretty proud of myself when I came up with the term “Breach Speed” (See: “When things are moving just a little too quickly . . . the whirlwind of data breaches” ); and I know my colleagues have had to live with me being a little more insufferable than usual , [Read More...]