Find out what's inside the August 2020 edition of the Journal & download a free copy of this month's featured article
- This event has passed so registration is closed.
Why passwords are a thin illusion of protection and what to do about it. Passwords have become nothing more than a thin illusion of protection. Human nature and human error are the weakest links in protecting organizations from cyberattacks and data breaches. Users choose poor passwords and then re-use them across multiple applications and systems, leaving them vulnerable to phishing and social engineering by bad actors. For years, users have been encouraged to create complex passwords and change them frequently.
It is time to remove human error from the equation.
The adoption of passwordless authentication protects against phishing attempts and minimizes the threat of stolen credentials. Passwordless technology generally combines: Multi-layered risk analysis that evaluates location, devices, access rights and typing sequences; Intricate yet convenient 2FA/MFA methods; Biometrics and hardware authentication keys
Learn how passwordless authentication works and how it can help you increase security while reducing friction for your users.
Dipto Chakravarty – Chairman of Security COE, IoT CommunityDipto Chakravarty is the author of three best-selling books on computer architecture and security from McGraw-Hill and Wiley that have been translated in five languages. He has 11 patents to his credit in AI, security and cloud, holds a M.S in Computer Science from U. of Maryland, GMP from Harvard Business School, and EMBA from Wharton School U. Penn. He is currently the Chairman of Security, Privacy and Trust COE for IoT Community, and board member at RANK Software.
Stephen Cox – Vice President and Chief Security Architect, SecureAuth
Stephen Cox is a technology veteran with nearly 20 years in the IT industry, including more than 10 years leading cybersecurity software development teams. A key player in some of the most influential IT security firms in the world, he is recognized as an expert in identity, network and endpoint threat detection, as well as an accomplished software architect.
As Vice President and Chief Security Architect at SecureAuth, Stephen is helps drive the strategy, vision and development for the company’s products and solutions. Prior to SecureAuth, Stephen worked at FireEye/Mandiant, RSA, VeriSign, Northrop Grumman and America Online. He holds a Master of Science in Software Engineering and a Bachelor of Science in Integrative Studies, both from George Mason University.