Leveraging the Cyber “High Ground”: How to Win the Endpoint Battle

For over 2,000 years, people have leveraged elevated terrain, or “high ground,” to gain a strategic advantage over enemies and protect their realm. The Chinese “Art of War” suggests high ground as a strategic position that provi… Continue reading Leveraging the Cyber “High Ground”: How to Win the Endpoint Battle

Strong Authentication for Endpoint Security: 3 Perspectives

Authentication solutions have been around for years. I actually started my cyber career working on one of the original and best two-factor (2FA) products – SecurID. Over the decades, the tech we use, the way we communicate and connect, and the th… Continue reading Strong Authentication for Endpoint Security: 3 Perspectives