Skip to content

What is it?

A subset of cybersecurity that protects networked devices, such as smartphones and medical equipment, that are usually accessed by an individual user or group.

Why is it important?

Endpoints are a vulnerable point of entry for breaches. Because of the large number of connected devices available and the wide diversity of types, endpoints are difficult to manage and keep vulnerabilities patched.

...continue reading "Term of the Week: Endpoint Security"

What is it?

The implementation of policies, practices, and technology to enable positive identification of people, devices, and applications.

Why is it important?

Understanding authentication is critical for establishing a secure environment because you must reliably know the identity of the people, devices, and applications accessing your resources in order to properly govern access and permissions.

...continue reading "Term of the Week: Authentication"