Interview with Jeff Kukowski, SecureAuth
socalTECH
JULY 28, 2017
All those layers and risk analysis people talk about only check very simple things, such as if someone is coming from a blocked IP from North Korea, or if I recognize the device. What we're looking for, is if people are coming from a suspicious computer, or are anonymous, or if they're coming from a known anonymous or criminal IP address.
Let's personalize your content