Cyber Defense eMagazine October Edition for 2021
Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH
Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
and operating costs. FIDO2 is the set of standards and protocols developed by the FIDO Alliance and<br />
the World Wide Web Consortium (W3C) to strengthen authentication. Passwordless authentication<br />
options <strong>for</strong> consumers could include use of “phone as a token” where an un phishable trusted relationship<br />
is established between the individual and their enrolled mobile phone. For private or secure<br />
environments like contact centers where a phone may not be feasible, FIDO2 security keys could be an<br />
efficient alternative. Users would utilize their preferred passwordless authenticator across multiple use<br />
cases.<br />
Ease of Administration and Resourcing: According to <strong>Cyber</strong>security Ventures, there will be 3.5 million<br />
unfilled cybersecurity jobs globally by end of <strong>2021</strong>, up from 1 million positions in 2014. A modern<br />
authentication system needs to enable “no code and low code” practices consistent with the current trend<br />
in software development world where policy development, administration and operation of these systems<br />
can be conducted by citizen developers without the need of specially trained and highly paid security<br />
operations resources. The ability to orchestrate complex user journeys with granular controls and a rulesbased<br />
engine that can intelligently step-up authentication based on risk level is critical.<br />
Support <strong>for</strong> Edge Cases and “Out of Band” Step-up: A key attribute <strong>for</strong> a modern authentication<br />
system is the ability to operate without limitation across multiple use cases such as WFH, that are<br />
commonly encountered by the user. Also, these should encompass scenarios such as lost phone, offline<br />
access when the authenticator may not be connected to a network. Account recovery, enrollment or<br />
reenrollment poses special challenges as there is an inherent danger of the authenticator having been<br />
compromised. An “out of band” step-up authentication capability that is established during identity<br />
proofing can help in these situations to restore confidence.<br />
About the Author<br />
A seasoned cybersecurity executive, Veridium CRO Rajiv Pimplaskar is<br />
driving global go-to-market strategy and revenue <strong>for</strong> Veridium. Based out<br />
of the company’s New York headquarters, Rajiv comes to Veridium from<br />
the San Francisco based Cloudmark – a leader in Threat Intelligence<br />
(acquired by Proofpoint). Previously, he held senior leadership roles<br />
spanning sales, marketing, product, and corporate development at Atlantis<br />
Computing (acquired by HiveIO) and Verizon. Rajiv is an Electrical<br />
Engineering and Computer Science professional by trade and is<br />
passionate about building and scaling enterprise software companies that<br />
offer a market disruption.<br />
First Name can be reached online at @veridiumid and at our company website<br />
https://www.veridiumid.com/<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>October</strong> <strong>2021</strong> <strong>Edition</strong> 85<br />
Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.