Remove Artificial Inteligence Remove CIO Remove Invest Remove IP
article thumbnail

Interview with Jeff Kukowski, SecureAuth

socalTECH

That's securing the network, looking at endpoints, and making other security investments across the board, and on such things like mobile device management for mobile phones. What we're looking for, is if people are coming from a suspicious computer, or are anonymous, or if they're coming from a known anonymous or criminal IP address.

IP 100