Remove Artificial Inteligence Remove CIO Remove IP Remove Software
article thumbnail

Interview with Jeff Kukowski, SecureAuth

socalTECH

All those layers and risk analysis people talk about only check very simple things, such as if someone is coming from a blocked IP from North Korea, or if I recognize the device. What we're looking for, is if people are coming from a suspicious computer, or are anonymous, or if they're coming from a known anonymous or criminal IP address.

IP 100