User Behavior Could Replace Passwords as Authenticator

The way users pitch a screen could authenticate them to access devices and systems.
上网闲逛有助提高工作效率,对员工的上网行为进行管理是一个挑战,每家组织都不同,每个人也都是独一无二的,安全控管的政策也需与时俱进、量体裁衣。
Leading the latest edition of the ISMG Security Report: a deep dive into how continuously monitoring user behavior could replace passwords as a means of authentication.
Also in the Security Report (click on player beneath player to listen), you’ll hear Government Accountability Office Information Security Issues Director Gregory Wilshusen explain why major U.S. federal government agencies continue to fall short in securing their IT assets.

The ISMG Security Report appears on this and other ISMG websites on Tuesdays and Fridays. Check out our Sept. 29 and Oct. 3 editions, which respectively analyze revised guidance on how to get C-suite executives to help shape information risk management and how enterprises around the world should prepare for the European Union’s General Data Protection Regulation, which starts being enforced in May.
The next ISMG Security Report will be posted on Tuesday, Oct. 10.
网络安全法培训短片
Theme music for the ISMG Security Report is by Ithaca Audio under a Creative Commons license.
与外部相关单位信息交换时要保证信息交换协议、策略、密钥等开发运维安全管理,采用国家和行业相关数据交换标准,保障数据交换过程安全可控。

猜您喜欢

别让无线安全偷走了办公的安全感!
保密讲堂第一弹:准确定密并正确标识国家秘密
网络安全法宣传片 002 国家网络安全的现状与重要性概述
逛威尼斯/聊意军战斗力 意大利游记(下)
SANTANDERCONSUMER PROEMAIL45
自带计算设备BYOD的安全职责探讨