Bwin Forum

You are not logged in.

#1 2020-09-10 06:05:37

From: Switzerland, Niederonz
Registered: 2020-09-10
Posts: 1

SSO and the Road to Passwordless

Industry Insights.
Read the latest cloud security news, trends, and thought leadership from subject matter experts.
Industry Insights            The Service Mesh Wars: Why Istio might not be favorite after all.
Published: 09/03/2020By Gadi Naor, CTO and Co-Founder, AlcideThese days, more organizations are shifting to cloud-native applications, which are designed to run in the cloud and take advantage of the cloud’s dynamic, scalable and readily-available nature.
Typically, cloud-native application architectures are made up.
​Get Quantum Ready.
Published: 09/02/2020By Maëva Ghonda, Co-Chair.

CSA Blockchain and Distributed Ledger Technology Working Group and Leighton Johnson

Member, CSA Blockchain Cybersecurity and Privacy Best Practices GroupBlockchain transactions rely on the strength of the “hash” process for integrity control.
What happens when this “ha.
SSO and the Road to Passwordless.
Published: 09/01/2020By Dave Lewis, Advisory CISO — Global at DuoWe’ve all heard the phrase “every journey starts with a single step.” While this might seem obvious on the face of it, we can often feel pressure to immediately arrive at our destination.
Discussions around passwordless often are too simplistic or too co.
Quantum-Safe Blockchain.
Published: 08/28/2020By Maëva Ghonda, Co-Chair, CSA Blockchain and Distributed Ledger Technology Working GroupBlockchain technologies are expected to generate more than $3 trillion annually in the next several years—by 2030.[1] The promise of blockchain is a self-contained decentralized ledger system that enables sec.

Shared Responsibility Model Explained

Published: 08/26/2020By CloudPassageCloud service providers adhere to a shared security responsibility model, which means your security team maintains some responsibilities for security as you move applications, data, containers, and workloads to the cloud, while the provider takes some responsibility, but not all.

3 Ways to Overcome Challenges in Vendor Risk Management

Published: 08/25/2020Written by WhisticOne of the most significant catalysts for the shift from reactive to proactive vendor security was the change in the way organizations do business and handle data and information.
The Changing SaaS LandscapeInfoSec is one of the latest industries to hop on the SaaS train, but it.
Cloud Security Alliance’s CASB Survey Finds Nearly 70% House Their Most Sensitive Data in Microsoft SharePoint Online/OneDrive.
Published: 08/25/2020By Tim Choi, Director of Product Marketing for ProofpointCOVID-19 changed everything overnight.
The traditional perimeter is gone and the things that were planned years in the future—like cloud migration—had to be fast tracked.
This sudden shift is the latest evidence that organizatio.

Enabling Data Protection and Compliance in the G Suite Environment

Published: 08/21/2020By Matt Hines, VP of Marketing at CipherCloud & Ishani Sircar, Product Marketing Manager at CipherCloudThe Rise of G Suite and Related Data Security ChallengesWith over 2 billion active users and a market share of 56.97 percent, .

G Suite is here to stay nd help enable today’s businesses to tac
SaaS Security Series: Understanding Salesforce Administrative Permissions

Published: 08/19/2020Brian Soby, CTO & Co-founder of AppOmniToday, more than ever, SaaS applications drive the modern enterprise.
They are relied upon for managing customer data, allowing internal collaboration, and keeping organizations connected across the world.
As the amount of sensitive and business-critical.

Can Passwordless Authentication Be Trusted?

Published: 08/17/2020By J.
Wolfgang Goerlich, Advisory CISO for Duo SecurityEvery new feature we introduce to our users is potentially a new tactic we provide our adversaries.
When I was learning to drive, this happened with car steering wheel locks.
Do you remember these.
Big bars people would put on their steering.
Security of the Blockchain.
Published: 08/14/2020Authors: Maëva Ghonda, CSA Blockchain Cybersecurity and Privacy Best Practices Group Leader Enterprise agility is the new standard.
New products are now launched at a pace that is crippling supply chains.
Therefore, enterprise innovations must be disruptive.
To enable disruptive innovations, we n.
How to secure DevOps.
Published: 08/12/2020By Andrey Pozhogin.

Senior Product Marketing Manager

Hybrid Cloud Security at KaperskySupply-chain attacks through public repositories have become more frequent of late.
Here’s how to deal with them.
Last month.

IT news websites reported that RubyGems

the official channel for distributing librar.

What Schrems 2 Means for your Privacy Shield Program

Published: 08/10/2020By Francoise Gilbert, CEO, DataMinding, Inc.
The publication of the EU Court of Justice decision in the Schrems 2 case has left many organizations, worldwide, facing a difficult dilemma.
What to do next to ensure the continuity of personal data flows from the European Union or European Economic Ar.
You’ve passed your SOX audit, but is your cloud environment really secure?.
Published: 08/10/2020By Petrina Youhan, Director of Channel Partnerships and Services at HyperproofMany organizations believe their cloud environment is secure because they passed their Sarbanes-Oxley (SOX) audit, but passing an audit doesn’t necessarily mean that your cloud environment is secure.
Cloud environments.
Compliance is the Equal and Opposite Force to Digital Transformation…that’s where DevOps comes in.
Published: 08/07/2020By J.
Travis Howerton, Co-Founder and CTO, C2 Labs.
This blog is shortened version of the original blog published by C2.
For the full length post go here.
Digital transformation will reshape all businesses, large and small, over the next decade and beyond; driven by the convergence of major techno.
A Better Than Remote Chance – More People Work from Home in Post COVID World.
Published: 08/05/2020By Matt Hines, VP of Marketing at CipherCloud & Neeraj Nayak, Sr.
Product Marketing Manager at CipherCloudSummary: New research underlines the fact that more people will likely prefer to work from home, even when the pandemic passes.
Security models that better address cloud apps, mobility an.
Upending Old Assumptions in Security.
Published: 08/03/2020By Wendy Nather, Head of Advisory CISOs at DuoEvery time you think you’ve figured out this risk management thing, something else happens to torpedo your hidden assumptions.
Remember when we assumed that an IP address was a pretty good indicator of someone’s physical location and origin, so a netw.
Strong MFA: The First Stop on the Path to Passwordless.
Published: 07/31/2020By Andrew Hickey, Director of Content at DuoStrong MFA: The First Stop on the Path to PasswordlessPasswords, the antiquated security mechanism in place since the 1960’s, have since their inception caused user and administrative frustration due to their complexity and frequent resets.
As technolog.
Implementing a Vendor Assessment Platform.
Tips for Long-Term Success.
Published: 07/27/2020By the Whistic TeamProactive vendor security is no longer just a buzzword tossed about in InfoSec conversations—it’s a must-have for cloud-based organizations to differentiate themselves from peers and vendors in a competitive landscape.
As data security is working its way up the list of corporat.

​Schrems 2 – 12 FAQs Published by the EDPB but Little Practical Guidance

Published: 07/24/2020By Francoise Gilbert, CEO, DataMinding, Inc.
Since the publication of the European Court of Justice (EUCJ) decision in the Schrems 2 case, businesses located on both sides of the Atlantic, and around the world, have been attempting to determine how they should interpret and act upon the decision.
Browse by Topic.
- Select Topic - Application Containers and Microservices Artificial Intelligence AWS Azure Big Data Blockchain/Distributed Ledger CAIQ CASB  CCSK Chapters Cloud Controls Matrix Cloud Incident Response Cloud Migration Cloud Security Services Management Common Vulnerability and Exposures  Compliance Consensus Assessments DevSecOps Enterprise Architecture Enterprise Resource Planning Events FedRAMP Financial Services Stakeholder Platform GDPR Health Information Management Hybrid Cloud Security Internet of Things Legal Misconfiguration Mobile Application Security Testing Open API Open Certification Framework Privacy Privacy Level Agreement Quantum-Safe Security Remote Workforce Security Risk Assessment Risk Management SaaS Governance Security as a Service Serverless Shared Responsibility Model Software Defined Perimeter STAR Threat Intelligence Top Threats Training Virtualization Vulnerabilities        1 2 3 4 5 … Next › Last ».


Board footer

Powered by FluxBB