multi-factor authentication

September 11, 2019

SECURITY

Ingredients Needed to Manage Network Tribbles

Cybersecurity – the final frontier, these are the trials and tribulations that network admins face on an ongoing basis. Sometimes it feels like network admins are Starfleet captains navigating unknown galaxies as the infrastructure of organizations become more complex.  Using a complicated mix of cl…

July 24, 2019

COLLABORATION

Why Collaboration IT Administrators Trust Webex

Built on Security We understand the responsibility you entrust to us when you pick Cisco Collaboration. You are trusting us with your most confidential information: customer data, patient and HR information, competitive and marketing strategy. Let’s face it, we know confidential conversations…

March 25, 2019

SECURITY

The One-Two Punch of User and Device Trust

Multi-factor authentication (MFA) is a proven method through which to ensure you’re verifying the identity of users who are accessing applications. It uses strong two-factor authentication to ensure your users are who they say they are. But trusting users is only one component of the trusted access…

February 27, 2019

SECURITY

The Zero Trust Games are here!

Every year at RSA Conference, a pitched battle ensues for the heart and soul of the security practitioner. Or at least for the mind: there’s the word cloud of topics that show up most often in the CFP submissions, but there are more slogans, phrases and concepts that meet in the expo hall to fight f…

February 4, 2019

SECURITY

Protecting Cisco AnyConnect VPN & Cloud Applications With Duo’s MFA

This blog post is the first in a three-part series on how Duo’s MFA integrates with Cisco AnyConnect VPN. Organizations are facing a major technology shift. They’re in the process of moving many of their on-premises workloads and applications to the cloud. But the transition to cloud isn’t as simple…

January 25, 2019

SECURITY

New Year, Same Reality: How Much Will Security Actually Change in 2019

If we look back at the security landscape of 2018, there were some interesting highs and lows.  There were a number of large-scale breaches in the news attributed to hackers, involving notable companies. All indications for 2019 don’t show any signs of this activity stopping or slowing down. In fact…

November 27, 2018

SECURITY

Securing Access to Our Nation’s Critical Infrastructure

It’s Critical Infrastructure Security and Resilience Month, but I think we can all agree that the topic at hand is, uh, more of a long-term necessity. About 85 percent of the nation’s critical infrastructures are privately owned and operated, as cited in NIST’s SP 800-82 Guide to I…