This is a dedicated watch page for a single video.
Dana needs a method of confirming the authenticity of data coming into an application her company is developing. As an information security professional, she recommends several techniques that can be built into the software. If the company can achieve its goals, it can hold users accountable for their actions. What has Dana and her team achieved?