Resource Library

Explore our collection of resources covering the latest in cybersecurity, industry trends, and expert insights

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Device Integrity Checks

07 Jun 2022

June 7, 2022

Device Integrity Checks

This Cybersecurity Hot Takes episode discusses how end-user decisions with authentication can negatively impact your security architecture.

Podcast
Thought Leadership
Device Integrity ChecksDevice Integrity ChecksDevice Integrity Checks
Prevention Is Better Than Detection

01 Jun 2022

June 1, 2022

Prevention Is Better Than Detection

This Cybersecurity Hot Takes episode discusses prevention vs detection and how frameworks like NIST play a role.

Podcast
Thought Leadership
Prevention Is Better Than DetectionPrevention Is Better Than DetectionPrevention Is Better Than Detection
The CISOs Report: Perspectives, Challenges, and Plans for 2022 and Beyond

31 May 2022

May 31, 2022

The CISOs Report: Perspectives, Challenges, and Plans for 2022 and Beyond

This study offers insights into what CISOs are doing and planning to do, the current threats they are most concerned about, and more

Report
Thought Leadership
The CISOs Report: Perspectives, Challenges, and Plans for 2022 and BeyondThe CISOs Report: Perspectives, Challenges, and Plans for 2022 and BeyondThe CISOs Report: Perspectives, Challenges, and Plans for 2022 and Beyond
Engineers Hate Authentication

29 May 2022

May 29, 2022

Engineers Hate Authentication

Do engineers actually hate writing authentication code? This Cybersecurity Hot Takes episode tackles this rumor.

Podcast
Engineers Hate AuthenticationEngineers Hate AuthenticationEngineers Hate Authentication
Hitting a Balance Between Security and Customer Friction

26 May 2022

May 26, 2022

Hitting a Balance Between Security and Customer Friction

Listen to experts discuss customer identity and access management, plus hitting a balance between security and customer friction.

Podcast
Hitting a Balance Between Security and Customer FrictionHitting a Balance Between Security and Customer FrictionHitting a Balance Between Security and Customer Friction
Hacking Duo in Real Time

23 May 2022

May 23, 2022

Hacking Duo in Real Time

See how a phishing link allows hackers to easily get past Duo's push 2FA.

Video
Hacking Duo in Real TimeHacking Duo in Real TimeHacking Duo in Real Time
Friction Isn't Bad

21 May 2022

May 21, 2022

Friction Isn't Bad

Can friction be good in MFA? Strategic friction can protect customers, such as requesting a biometric in some authentication situations.

Podcast
Friction Isn't BadFriction Isn't BadFriction Isn't Bad
Assume A Hostile Environment

14 May 2022

May 14, 2022

Assume A Hostile Environment

In this Cybersecurity Hot Takes episode the discussion centers around how you should always assume that you're operating in a hostile environment.

Podcast
Breach Analysis
Assume A Hostile EnvironmentAssume A Hostile EnvironmentAssume A Hostile Environment