How would you rate your level of visibility into your cloud storage platform(s)?
More than adequate17%
Adequate76%
Less than adequate6%
Completely inadequate
394 PARTICIPANTS
2.7k views
Content you might like
When securing your mobile application(s), which of the following is your #1 priority to protect?
Your core data30%
Your cryptographic keys57%
Your proprietary code12%
Other (please comment below)
What are the best practices for securing the MFA registration phase when moving from SMS to phishing-resistant methods like passkeys (FIDO2) or TOTP-based authenticator apps? Specifically, how can we mitigate risks in device enrollment and key provisioning without phone numbers? What innovations are your organizations implementing or have implemented to bolster this process? - I don't see this as a competitive advantage but all of us good guys against the bad.
Have you inventoried your API footprint?
Yes50%
We have plans to inventory our API footprint40%
No8%
Other (share in the comments)