article thumbnail

Zero Trust

Phil Windley

My new book Learning Digital Identity from O'Reilly Media covers many of the topics in this post such as multi-factor authentication, authorization and access control, and identity policy development in depth. User Authentication: Multi-Factor Authentication (MFA): Requiring users to provide multiple forms of verification (e.g.,

article thumbnail

Technology Short Take 176

Scott Lowe

The vulnerability affects virtually all Linux distributions and allows attackers to bypass the secure boot protections and insert a low-level bootkit. This would be why I hate it when companies force me to use SMS for two-factor authentication—at least let me use a one-time passcode or something. That’s all for now!

Linux 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Managing the holiday haze: How AI helps your Contact Center go the distance

CIO Business Intelligence

For instance, the VA might pull interaction details or applicable policies or discounts that the employee can offer mid-conversation, better positioning them to personalize the customer’s experience and get them the answers they need fast. The result is faster service that actually helps build customer-brand connections.

article thumbnail

I was a virtual NBA fan: What it’s like to cheer from the digital sidelines in Microsoft Teams

GeekWire

This is the spectator view for fans watching NBA games “courtside” in Microsoft Teams: the live stream on one side, and your virtual cheering section on the other. My big takeaway: Microsoft and the NBA are on to something with their new tech-fueled virtual fan experience. Look out for me in the virtual stands!!!

article thumbnail

Meet the 8 startups that just pitched at a virtual Demo Night hosted by Female Founders Alliance

GeekWire

Seattle-based FFA just wrapped up a virtual version of its eight-week Ready Set Raise program, which requires each company to have a female or non-binary CEO. This year’s cohort was selected from a batch of more than 400 applications. Fix Fake solves this problem by halving the authentication costs.

article thumbnail

Cherokee Nation empowers its citizens with IT

CIO Business Intelligence

Cherokee Nation had run digital campaigns in the past, but the systems in place could not authenticate citizenship, leaving a significant amount of manual labor behind each interaction. COVID-19 expedited the need for a digital platform to handle authentication and meet the spike in demand for assistance in the wake of a global pandemic.

article thumbnail

Governance and Fighting the Curse of Complexity

CIO Business Intelligence

Shadow IT introduces systems and applications that are often outside of an enterprise’s catalog of IT tools. Authentication. Tools to Rein In Complexity Thankfully, In the IT and security worlds we’re being offered tools to simplify and integrate virtually every part of our IT ecosystems. Password strategies. Encryption.