Multifactor Authentication and Identity Management for Secure Remote Access

June 28, 2016

Mobile technologies give people the power to work wherever and whenever they choose. Remote access drives astonishing gains in productivity and employee satisfaction, but enterprises who use simple passwords to protect that access risk financial loss, data theft, and worse. Passwords are to blame for some of the most infamous recent data breaches. At Anthem Blue Cross, attackers gained access to sensitive medical data using credentials stolen from a handful of database admins. Target, the retail giant, lost credit card information to cybercriminals who used credentials taken from contractors. The Democratic National Committee’s most sensitive email messages were downloaded and published despite repeated warnings from the FBI.

Spotlight

LeEco

Letv.com is the world's first public video company. The only fully domestically funded company among China's major Internet companies. The true Internet company among listed companies in China's A-share stock market China's No.1 video company with the highest value in China's GEM board. The earliest copyrighted video website and a committed defender of video copyrights in China. The largest library of online movies and dramas and copyrighted sports videos, and the most professional long-video website. China's first Internet company to own a large film studio The world's first Internet company to own a TV brand.

OTHER WHITEPAPERS
news image

The Cyber Resilience Index: Advancing Organizational Cyber Resilience

whitePaper | June 28, 2022

The World Economic Forum Centre for Cybersecurity – in collaboration with the Cyber Resilience Index working group and in partnership with Accenture – developed the global Cyber Resilience Index (CRI). The CRI provides public- and private-sector cyber leaders with a common framework of best practice for true cyber resilience, a mechanism to measure organizational performance, and clear language to communicate value.

Read More
news image

File Upload Security: The Missing Category for a Comprehensive Security Posture

whitePaper | December 15, 2022

Applications are the backbone of modern business and must be protected. Yet, most organizations have an underserved attack vector — malicious files uploaded to their custom business applications. If internal, external, or third-party files contain malware, they pose a large risk as they traverse through an organization and are stored in local or cloud repositories. Public file sharing platforms are another area where malicious file uploads can cause widespread damage.

Read More
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More
news image

2022 Cybersecurity Predictions

whitePaper | June 27, 2022

At the end of every year, our experts put their heads together to anticipate and prepare for what’s to come next in the world of cybersecurity. We retrospect on the months past, and analyze impactful developments, breaches, and tactics. We package the outputs of this process for IT leaders, so they, too, can anticipate and prepare.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

Cloud Native Security Model

whitePaper | December 23, 2022

Moving to the cloud is more than a technical transition to a new platform. It is a core part of an enterprise's growth strategy and while strategically important, it can also be potentially disruptive.

Read More

Spotlight

LeEco

Letv.com is the world's first public video company. The only fully domestically funded company among China's major Internet companies. The true Internet company among listed companies in China's A-share stock market China's No.1 video company with the highest value in China's GEM board. The earliest copyrighted video website and a committed defender of video copyrights in China. The largest library of online movies and dramas and copyrighted sports videos, and the most professional long-video website. China's first Internet company to own a large film studio The world's first Internet company to own a TV brand.

Events