How to best protect your mobile-restricted environment


Mobile-restricted environments are those where users can’t, won’t, or don’t use mobile phones due to security or productivity reasons. Therefore, to authenticate users before they are given access to sensitive data, mobile authentication is simply not an option. Read this solution brief to learn how hardware backed security keys, based on modern authentication protocols, can secure users and their data in these sensitive workspaces.
Recommended Posts

Supply chain security in 2022
The SolarWinds and Colonial Pipeline security breaches are two (of many) incidents that have made supply chain attacks go mainstream. The primary challenge for businesses is that supply chain defense isn’t easy given the hundreds, if not thousands of entry points that need to be monitored along the way. But there are best practices that …

Privileged Access Management at CERN: Q&A with Dr. Stefan Lüders
In an era of increasing cyber attacks, how do you balance the desire for unrestricted research freedom against the need to protect that research from cyber threats? This is the challenge faced by CERN, leaders in the scientific research community. Their solution? Provide a clear articulation of what constitutes privileged data, and create flexible security …

Who can CISOs trust? Sharing information is both essential and a professional hazard
President Biden’s recent executive order on cybersecurity calls on the public sector to work with private companies to create more secure environments and emphasizes the importance of sharing information as a best practice. Many of us may see “information sharing” as a synonym for risk or liability as information sharing requires a lot of caution. …

Private: Supply chain security in 2022
The SolarWinds and Colonial Pipeline supply chain security breaches are two (of many) incidents that have made software supply chain attacks go mainstream. The primary challenge for businesses is that supply chain defense isn’t easy given the hundreds, if not thousands of entry points that need to be monitored along the way. But there are …