CIO Influence

Tag : multi-factor authentication

Analytics Automation Digital Transformation Guest Authors Machine Learning Security

The Password Paradox: Why Human Psychology Makes Us Our Own Worst Enemy

John Trest
We live in a digital age where the rules for online security are clear: strong, unique passwords, no reuse, and regular changes. Despite this awareness,...
Digital Transformation Featured IT and DevOps Networking Security

Quantum-Resistant Identity Security: Preparing for the Post-Quantum Threat Era

As quantum computing advances, it brings both opportunities and threats to cybersecurity. One of the most critical areas of concern is identity security, which ensures...
Cloud Guest Authors IT Ops IT services SaaS Security

3 Key IT Strategies for Mid-Market CIOs to Solve Pain Points at the Endpoint

Kamal Srinivasan
Mid-market companies are facing the future with IT operational demands that are growing in complexity every year. To counter this, theyโ€™re looking for ways to...
Analytics Featured IT services Security

Building Cyber Resilience with Zero Trust Architecture

Where cyber threats grow more sophisticated and pervasive, organizations must prioritize robust security frameworks. One such paradigm that has gained traction is zero-trust architecture. By...
CIO Influence News Cryptocurrency Security

Deepfake Attacks Are Winning in Crypto: 57 Percent Companies Impacted, Regula’s Study Finds

Business Wire
Regula, a global developer of identity verification solutions, has released new insights from itsย ‘Deepfake Trends 2024’ study, focusing on emerging identity verification (IDV) trends within...
CIO Influence News IT services Security

Yubico Announces Yubico Enrollment Suite for Microsoft Users, a Turnkey Passwordless Onboarding Experience

Business Wire
Enterprise users further empowered to be phishing-resistant and go passwordless on day one Yubico ย the leading provider of hardware authentication security keys, announced the availability...
Guest Authors Security Technology

Maximizing Value: Optimizing Cybersecurity with Existing Systems

Nate Galimore
As cybersecurity continues to evolve, one trend is becoming clear: organizations are now placing greater emphasis on maturing their existing authentication capabilities. The question is...