Governance & Risk Management , IT Risk Management

Identity Security and the Quest for Zero Trust

Stephen Cox of SecureAuth on the Passwordless Future
Stephen Cox, vice president and chief security architect, SecureAuth

Forget inside/outside the perimeter when mitigating risks. That's the notion behind "zero trust," which means applying risk-based controls to safeguard access, says Stephen Cox of SecureAuth.

In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Cox discusses:

  • Cloud service attack trends;
  • Best practices for mitigating risks;
  • How to make the concept of "zero trust" work in practice.

Cox is vice president and chief security architect at SecureAuth. He has nearly 20 years of experience in the IT industry, including 10 years leading software development teams in the security industry. Previously, Cox served as technical lead of the endpoint and FireEye-as-a-service development teams at FireEye/Mandiant. Earlier, he worked at RSA NetWitness as principal developer of NetWitness Spectrum, served a number of years at VeriSign in support of the DNS resolution operations team, and also served in various software development roles at Northrop Grumman and America Online.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.