Войти
  • 16993Просмотров
  • 1 год назадОпубликованоIBM Technology

Risk-Based Authentication Explained

Read the Cost of a Data Breach report → Learn more about AI for Cybersecurity → How do you know who someone really is? It can be hard to tell. How thorough you are might depend on context. That's what risk-based authentication does. In this video Jeff Crume talks about how a risk assessment might change how your cybersecurity handles different requests to keep your IT estate secure. Sign up for a monthly newsletter: Security updates from IBM →