article thumbnail

Why you need a strong authentication platform

Network World

According to Symantec ’s annual Internet Security Threat Report , up to 80 percent of breaches could be eliminated with strong authentication. With data breaches and information theft on the rise, it’s becoming even more crucial to protect your data from unwanted third parties.

article thumbnail

9-vendor authentication roundup: The good, the bad and the ugly

Network World

Due to numerous exploits that have defeated two-factor authentication, either by social engineering, remote access Trojans or various HTML injection techniques, many IT departments now want more than a second factor to protect their most sensitive logins and assets. To read this article in full or to leave a comment, please click here

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fed Tech Roundup August 27

CTOvision

Symantec takes on the Internet of unsecured things - GCN.com. Prioritizing authentication, GitHub attacked, Carter back to Silicon Valley. North Dakota: Armed police drones and high-altitude, nighttime tests - GCN.com. DARPA wants to take the sting out of DDoS attacks - GCN.com. FCW.com.

Symantec 150
article thumbnail

Understanding the Security Risks of New Cloud Software

CTOvision

In addition, all data should be encrypted before you send it , then authenticated at endpoints by the latest standards, such as IPsec or PAP. Security companies like Blue Coat and Symantec have focused their efforts on advanced threat protection that integrates both local and cloud services into the same comprehensive security policy.

Cloud 150
article thumbnail

Broadcom’s Approach Towards Delivering Customer Value

CIO Business Intelligence

Customers can also operate with confidence as a result of our actions in software, such as our migration of Symantec Web Security Service and Cloud Access Security Broker onto Google Cloud.

Vmware 85
article thumbnail

The future of trust—no more playing catch up

CIO Business Intelligence

By Eric Chien, Director of Security Response, Symantec Enterprise Division, Broadcom This is a continuation of Broadcom’s blog series: 2023 Tech Trends That Transform IT. Stay tuned for future blogs that dive into the technology behind these trends from more of Broadcom’s industry-leading experts.

Trends 52
article thumbnail

A CISO POV: Securing AI in your company

CIO Business Intelligence

Patricia was previously the CISO at Markel Insurance, Freddie Mac, Symantec, and Unisys, and her insights have always been extremely valuable to her peers. Using AI in social engineering will blow the top off our methods for authorization and authentication.

Company 72