Check out this riff with Roger Nowakowski, CIO of FHLBanks and myself as we discuss third-party access control, step-up authentication and control of uncontrolled endpoints.
In particular, I liked his comments on User Behavior Analytics (UBA) – which is a very modern (next gen) approach to securing end-points. Step-up authentication
- Securing uncontrolled end-points
- Avoid making exceptions – even for the executives
- Base-lining – User Behavior Analytics (UBA)
What others can you think of? Join in, so we can gain insight from the crowd.
SHARE your favorite security tools with us on LinkedIn 👉 here.