article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

Thales and Microsoft partner to provide Azure customers with FIDO and CBA phishing-resistant authentication

Thales Cloud Protection & Licensing

Thales and Microsoft partner to provide Azure customers with FIDO and CBA phishing-resistant authentication. The impact and cost of cyber-attacks have skyrocketed, driving the need for better identity protection with phishing-resistant Multi-Factor Authentication (MFA). Microsoft Azure Certificate-Based Authentication Support.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Modern Authentication and Its Role in Achieving Zero Trust Security?

Thales Cloud Protection & Licensing

What is Modern Authentication and Its Role in Achieving Zero Trust Security? The evolving business and technology landscape and the need for secure, yet convenient, ways of logging into applications are driving the quest for more effective authentication. From static authentication…. to dynamic, context based authentication.

article thumbnail

Hardware-based PKI provides strong passwordless authentication

Thales Cloud Protection & Licensing

Hardware-based PKI provides strong passwordless authentication. The need to manage users and authenticators in a secure and timely way is important with any PKI-based deployment. Certificate-based and software authentication solutions and OTP. Simply put, strong authentication helps verify data security. PKI Management.

article thumbnail

Identifying E-signature Requirements to Accelerate Digital Adoption and Meet Global Compliance

AIIM

In a recent AIIM webinar, Craig Le Clair, Forrester VP and Principle Analyst, and Florian Vondal, Allianz Solution Architect, took a closer look at the “esign of the times” and what must be considered when attempting to accelerate e-signature adoption enterprise-wide and meet global compliance.

article thumbnail

This Cybersecurity Awareness Month, Implement Multi-Factor Authentication

Rocket Software

We support CISA’s recommendation that everyone implement multi-factor authentication (MFA) to dramatically decrease the likelihood of their accounts being infiltrated. Multi-factor authentication requires users to provide two or more pieces of evidence in order to gain access to a network, system or application.

article thumbnail

Five Hot Security and Privacy Topics You Need To Understand in 2022

Thales Cloud Protection & Licensing

Throughout 2021 Thales hosted several webinars whose purpose was to raise awareness on trending topics around cybersecurity and privacy. Although all webinars were a success, some stood out of the competition for various reasons. Although all webinars were a success, some stood out of the competition for various reasons.

Privacy 71