Industry news on it security and innovative it strategies
At Liga, we keep our eyes and ears open, so we are always at the forefront of what is happening in IT security. In addition, we have our own resources that contribute articles and blog posts on cybersecurity, authentication, and other relevant topics. Tune in to the Liga news channel to receive news on key topics.
Public key infrastructure (PKI), the combination of policies, hardware, and software, is very handy when it comes to authentication. It brings the highest security and can easily be incorporated into
Nu er det slut med at fumle med sit NemID papkort eller gøre det forbudte – at finde billedet af nøglekortet frem på mobilen, når man skal ind på sin
Retailers have a much greater awareness of IT security threats and costs than public sector organizations, according to the latest Proofpoint “Voice of the CISO report.” Could the difference be driven by accounting and the profit factor – and not their IT networks?
Users know their role in your organization’s cyber-security – and they’re your greatest vulnerability
At first glance, it seems like a contradiction in vulnerabilities. If employees and end users know that they have an important role to play in your cyber security, then why are they still your greatest potential problem?
The need to secure the users’ digital identities is indisputable. Resources in the IT department is often scarce, and ideally the focus for IT should be on creating value for the business – not adding manual processes and administrative tasks. So how do you obtain maximum security with a minimum of effort?
På få år er FIDO-autentificering vokset fra at været et koncept til en global standard, der understøttes af førende browsere og platforme. Målet har siden 2013 været at etablere en
Imagine one of your colleagues wants to access Office 365 when they’re out and about, using their own mobile? It’s not that hard to picture, right? But as an IT
New software packages will make it easier for organizations and app developers to get rid of user names and passwords and replace them with true digital identification on tablets Over