Managing the whole lifecycle for human and machine authentication
In my last column for CIO.com, I outlined some of the cybersecurity issues around user authentication for verification of consumer and business accounts. Among other things, I advocated that in this remote/hybrid work era, CISOs must protect their company’s access to data by having a cyber-attack plan ready to implement, understanding the new tools and…