Access Granted Radiohttp://www.blogtalkradio.com/theaccessgrantedToday's top security minds come together to talk cybersecurity and authentication.enBlogTalkRadio.com. All Rights Reserved.Sat, 15 Jun 2019 06:45:00 GMTTue, 16 Feb 2016 05:00:00 GMTTechnologyBlogTalkRadio Feed v2.0https://dasg7xwmldix6.cloudfront.net/hostpics/a53ee2cd-e5c1-4b63-9c28-5625bd6c82c3_authomate_image2.jpgAccess Granted Radiohttp://www.blogtalkradio.com/theaccessgrantedToday's top security minds come together to talk cybersecurity and authentication.feeds@blogtalkradio.comBlogTalkRadio.comtechnology,authentication,network security,cyber security,information security,cybersecurity,authomate,strong authentication,jeff schmidt,multifactor authenticationAccess Granted RadionoToday's top security minds come together to talk cybersecurity and authentication.episodicAnalyzing the security threats facing high-risk, highly-regulated industrieshttp://www.blogtalkradio.com/theaccessgranted/2016/02/16/analyzing-the-security-threats-facing-high-risk-highly-regulated-industriesTechnologyhttp://www.blogtalkradio.com/theaccessgranted/2016/02/16/analyzing-the-security-threats-facing-high-risk-highly-regulated-industries/#commentshttp://www.blogtalkradio.com/theaccessgranted/2016/02/16/analyzing-the-security-threats-facing-high-risk-highly-regulated-industriesTue, 16 Feb 2016 05:00:00 GMTAnalyzing the security threats facing high-risk, highly-regulated industriesAll enterprises and organizations are at risk of a security breach, but some industries - such as finance, retail and healthcare - are prime targets for today's increasingly sophisticated cyber threats.. In this episode of the Access Granted Radio, Authomate CEO - Jeff Schmidt - joins the program to discuss the reasons why these industries are increasingly targeted by malicious actors, why it's difficult for organizations in these industries to tighten security, and what they can do to defend themselves and their networks from attack 00:17:00Access Granted Radionoauthomate,jeff smidt,cyber security,financial services,retailAll enterprises and organizations are at risk of a breach, but some industries - such as finance, retail and healthcare - are prime targets.Taking a new approach to security and authenticationhttp://www.blogtalkradio.com/theaccessgranted/2015/12/23/taking-a-new-approach-to-security-and-authenticationTechnologyhttp://www.blogtalkradio.com/theaccessgranted/2015/12/23/taking-a-new-approach-to-security-and-authentication/#commentshttp://www.blogtalkradio.com/theaccessgranted/2015/12/23/taking-a-new-approach-to-security-and-authenticationWed, 23 Dec 2015 18:00:00 GMTTaking a new approach to security and authenticationCISOs and CIOs are getting very sick of the traditional security and authentication solution landscape - filled with disparate solutions that all lock down the network and its information and make it difficult for an enterprise to share information and exchange data. Today, enterprises are shifting to a more risk-focused approach to security and looking for solutions that not only enable more freedom to share information and collaborate, but also focus on ease-of-use to facillitate usage and adoption. In this episode of the Access Granted Radio, Authomate CEO - Jeff Schmidt - drops by the studio to discuss this new approach to security, which was the catalyst for his company's recent $1M investment. 00:18:00Access Granted Radiononetwork security,cyber security,information security,cybersecurity,authenticationHow the security and authentication industry is changing, and what today's CISOs are looking for in their solutions.Shared credentials - security dream or nightmare?http://www.blogtalkradio.com/theaccessgranted/2015/12/10/shared-credentials--security-dream-or-nightmareTechnologyhttp://www.blogtalkradio.com/theaccessgranted/2015/12/10/shared-credentials--security-dream-or-nightmare/#commentshttp://www.blogtalkradio.com/theaccessgranted/2015/12/10/shared-credentials--security-dream-or-nightmareThu, 10 Dec 2015 16:00:00 GMTShared credentials - security dream or nightmare?Sharing credentials is often considered a security expert's worst nightmare. But credential sharing might not be as terrible as many would believe. In this episode of the Access Granted Radio, John Lloyd, the Chief Marketing and Sales Officer at authentication solution provider, Authomate, joins us to discuss the catch 22 of shared credentials, and why they could actually help secure an enterprise. 00:12:00Access Granted Radionoshared credentials,security credentials,network security,cybersecurity,cyber securityMany experts consider shared credentials a major security vulnerability - but they don't have to be.Big game phishing - how to avoid being the catch of the dayhttp://www.blogtalkradio.com/theaccessgranted/2015/08/04/big-game-phishing--how-to-avoid-being-the-catch-of-the-dayTechnologyhttp://www.blogtalkradio.com/theaccessgranted/2015/08/04/big-game-phishing--how-to-avoid-being-the-catch-of-the-day/#commentshttp://www.blogtalkradio.com/theaccessgranted/2015/08/04/big-game-phishing--how-to-avoid-being-the-catch-of-the-dayTue, 04 Aug 2015 16:00:00 GMTBig game phishing - how to avoid being the catch of the dayThe news is filled with stories about large corporations that have been breached thanks in part to compromised credentials. In many cases, these credentials have belonged to high-ranking employees and senior leaders that have fallen prey to phishing scams. In this episode of the Access Granted podcast, Authomate's CEO - Jeff Schmidt - drops by to discuss phishing and what companies can do to ensure they don't fall victim. 00:14:00Access Granted Radionophishing,security,cyber security,network security,information securityJeff Schmidt of Authomate discusses phishing scams and how companies can keep themselves from falling victim.Are biometrics truly the best authentication factor?http://www.blogtalkradio.com/theaccessgranted/2015/06/17/are-biometrics-truly-the-best-authentication-factor-1Technologyhttp://www.blogtalkradio.com/theaccessgranted/2015/06/17/are-biometrics-truly-the-best-authentication-factor-1/#commentshttp://www.blogtalkradio.com/theaccessgranted/2015/06/17/are-biometrics-truly-the-best-authentication-factor-1Wed, 17 Jun 2015 14:00:00 GMTAre biometrics truly the best authentication factor?With the inclusion of the thumbprint scanner on iPhones, it's safe to assume that practically every American has had some interaction or introduction with biometrics. However, are fingerprint and other biometric factors the best way to secure our devices and accounts? In this episode of the Access Granted Radio, we sit down with Authomate's CEO - Jeff Schmidt - to discuss the use of biometrics in authentication and why they may not be the perfect solution that many peopleconsider them to be. 00:23:00Access Granted RadionoJeff Schmidt,Authomate,Access Granted,cybersecurity,cyber securityWith the inclusion of the thumbprint scanner on iPhones, it's safe to assume that practically every American has had some interaction or introduction with biomeThe perils of free security softwarehttp://www.blogtalkradio.com/theaccessgranted/2015/05/26/the-perils-of-free-security-softwareTechnologyhttp://www.blogtalkradio.com/theaccessgranted/2015/05/26/the-perils-of-free-security-software/#commentshttp://www.blogtalkradio.com/theaccessgranted/2015/05/26/the-perils-of-free-security-softwareTue, 26 May 2015 18:30:00 GMTThe perils of free security softwarePiyush Bhatnagar, the CTO of Authomate, discusses the real reasons why users should be at least skeptical – and at most, fearful – of free security solutions, and why you ultimately get what you pay for when it comes to security and authentication software. 00:09:00Access Granted Radionoauthentication,strong authentication,cybersecurity,cyber security,network securityPiyush Bhatnagar, the CTO of Authomate, discusses the real reasons why users should be at least skeptical – and at most, fearful – of free security solutions, aAnalyzing location and intent as authentication factorshttp://www.blogtalkradio.com/theaccessgranted/2015/05/18/analyzing-location-and-intent-as-authentication-factorsTechnologyhttp://www.blogtalkradio.com/theaccessgranted/2015/05/18/analyzing-location-and-intent-as-authentication-factors/#commentshttp://www.blogtalkradio.com/theaccessgranted/2015/05/18/analyzing-location-and-intent-as-authentication-factorsMon, 18 May 2015 20:00:00 GMTAnalyzing location and intent as authentication factorsAdditional authentication factors - such as location and intent - are becoming increasingly popular in today's multifactor authentication solutions. In this episode of the Access Granted Radio program, Authomate's CEO - Jeff Schmidt - joins the show to discuss the benefits of these factors for enterprise and individual security and how they work. 00:23:00Access Granted Radionoauthentication,multifactor authentication,strong authentication,Authomate,information securityAdditional authentication factors - such as location and intent - are becoming increasingly popular in today's multifactor authentication solutions. In this epiStrong authentication and security without the hasslehttp://www.blogtalkradio.com/theaccessgranted/2015/04/16/strong-authentication-and-security-without-the-hassleTechnologyhttp://www.blogtalkradio.com/theaccessgranted/2015/04/16/strong-authentication-and-security-without-the-hassle/#commentshttp://www.blogtalkradio.com/theaccessgranted/2015/04/16/strong-authentication-and-security-without-the-hassleThu, 16 Apr 2015 15:00:00 GMTStrong authentication and security without the hassleThe Authomate executive team - including the company’s CEO, Jeff Schmidt, CTO, Piyush Bhatnagar and Chief Sales and Marketing Officer, John Lloyd - join the program to announce and discuss the preview release of their new and improved StrongPass solution, and why its ability to deliver strong, four factor authentication is essential for consumers and enterprises today. 00:11:00Access Granted RadionoAuthomate,StrongPass,Jeff Schmidt,Piyush Bhatnagar,John LloydThe Authomate executive team - including the company’s CEO, Jeff Schmidt, CTO, Piyush Bhatnagar and Chief Sales and Marketing Officer, John Lloyd - join the proThe advantages of multi-factor authenticationhttp://www.blogtalkradio.com/theaccessgranted/2015/04/03/the-advantages-of-multi-factor-authenticationTechnologyhttp://www.blogtalkradio.com/theaccessgranted/2015/04/03/the-advantages-of-multi-factor-authentication/#commentshttp://www.blogtalkradio.com/theaccessgranted/2015/04/03/the-advantages-of-multi-factor-authenticationFri, 03 Apr 2015 14:00:00 GMTThe advantages of multi-factor authenticationAuthomate CEO, Jeff Schmidt, joins the program to discuss the advantages of multi-factor authentication, why its safer, the different factors used for authentication and why some enterprises have yet to adopt it. 00:22:00Access Granted Radionoauthentication,security,cyber security,information security,network securityAuthomate CEO, Jeff Schmidt, joins the program to discuss the advantages of multi-factor authentication, why its safer, the different factors used for authenticThe Difference Between Out-of-Band and In-Band Authenticationhttp://www.blogtalkradio.com/theaccessgranted/2015/03/24/the-difference-between-out-of-band-and-in-band-authenticationTechnologyhttp://www.blogtalkradio.com/theaccessgranted/2015/03/24/the-difference-between-out-of-band-and-in-band-authentication/#commentshttp://www.blogtalkradio.com/theaccessgranted/2015/03/24/the-difference-between-out-of-band-and-in-band-authenticationTue, 24 Mar 2015 21:00:00 GMTThe Difference Between Out-of-Band and In-Band AuthenticationPiyush Bhatnagar, the CTO of Authomate, joins the program to discuss the differences between in-band and out-of-band authentication, and why out-of-band is more secure for consumers and enterprises today.   00:10:00Access Granted Radionoauthentication,multi-factor authentication,out-of-band,in-band,out-of-band authenticationPiyush Bhatnagar, the CTO of Authomate, joins the program to discuss the differences between in-band and out-of-band authentication, and why out-of-band is moreIt's a jungle out there - the current cyber security landscapehttp://www.blogtalkradio.com/theaccessgranted/2015/02/19/its-a-jungle-out-there--the-current-cyber-security-landscapeTechnologyhttp://www.blogtalkradio.com/theaccessgranted/2015/02/19/its-a-jungle-out-there--the-current-cyber-security-landscape/#commentshttp://www.blogtalkradio.com/theaccessgranted/2015/02/19/its-a-jungle-out-there--the-current-cyber-security-landscapeThu, 19 Feb 2015 19:30:00 GMTIt's a jungle out there - the current cyber security landscapeAuthomate's CTO, Piyush Bhatnagar, and CEO, Jeff Schmidt, join the program to discuss the current cybersecurity landscape facing today's consumers and enterprises, and why U.S. citizens today need to take more personal responsibility for the security of their personal data. 00:16:00Access Granted Radionoinformation security,cybersecurity,network security,authentication,identity theftAuthomate's CTO, Piyush Bhatnagar, and CEO, Jeff Schmidt, join the program to discuss the current cybersecurity landscape facing today's consumers and enterpris