Interview: Former FBI Analyst on the CJIS MFA Mandate & Duo

Interview: Former FBI Analyst on the CJIS MFA Mandate & Duo

Recently, the FBI updated their CJIS (Criminal Justice Information Security) policy to require MFA for accessing any application housing CJIS data. Thankfully, we have a former FBI analyst on the Cisco Security team who can break it all down for us. Questions: 1. You’re currently the PMM Leader for Government and Public Sector at Cisco. Before joining Cisco, you spent 25 years supporting the United States Intelligence Community for various agencies. What do you see…

Read More

The growing multifactor authentication imperative

The growing multifactor authentication imperative

The growing multifactor authentication imperative | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Now is the time to prioritize cybersecurity

Now is the time to prioritize cybersecurity

Now is the time to prioritize cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Top malware strains observed in 2021

Top malware strains observed in 2021

Top malware strains observed in 2021 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Rob Thompson named CIO at Wayne State University

Rob Thompson named CIO at Wayne State University

Rob Thompson named CIO at Wayne State University | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

6 ways to improve access and authentication protocols

6 ways to improve access and authentication protocols

6 ways to improve access and authentication protocols | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

$5.9 billion lost due to fraud in 2021

.9 billion lost due to fraud in 2021

$5.9 billion lost due to fraud in 2021 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

4 common cybersecurity flaws in healthcare organizations

4 common cybersecurity flaws in healthcare organizations

4 common cybersecurity flaws in healthcare organizations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Document protection and insider threats

Document protection and insider threats

Document protection and insider threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Why two-factor authentication messages should be branded

Why two-factor authentication messages should be branded

Why two-factor authentication messages should be branded This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More
1 2