article thumbnail

Cisco Duo Enhances Epic Mobile Apps Security

Duo's Security Blog

Epic’s new flagship EPCS healthcare management mobile apps Haiku and Canto integrate with Cisco Duo to provide multi-factor authentication (MFA). Duo integrates with Epic Haiku and Canto mobile apps seamlessly to provide a strong second authentication factor to protect patient electronic health records. Summary

Mobile 119
article thumbnail

GUEST ESSAY: Why it’s high time for us to rely primarily on passwordless authentication

The Last Watchdog

The next big thing is passwordless authentication. For example, we have passwordless facial and fingerprint biometric logins on our mobile phones and the thousands of apps that we use, as well as on our laptops and similar portable devices. The bottom line is user authentication is vital for securing access to data and systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Isn’t Mobile at the Center of Your Cybersecurity Strategy?

Security Boulevard

This is the first article in a guest blog series by Jason Bloomberg, Managing Partner, Intellyx Focusing on user authentication, including multi-factor authentication, is not enough to put mobile at the center of your cybersecurity strategy. The post Why Isn’t Mobile at the Center of Your Cybersecurity Strategy?

Mobile 80
article thumbnail

How to Protect Your Accounts with Multi-Factor Authentication

Duo's Security Blog

Multi-factor Authentication (MFA) protects your environment by guarding against password weaknesses with strong authentication methods. In today’s blog, we’re unpacking why MFA is a cornerstone topic in this year’s Cybersecurity Awareness Month and how it can keep your organization safe from potentially devastating cyber attacks.

article thumbnail

Guest Blog: Alissa Knight on ‘FHIR Walker: Authentication and Authorization in FHIR APIs’

Security Boulevard

In this blog, Alissa covers mobile API authentication and authorization. The post Guest Blog: Alissa Knight on ‘FHIR Walker: Authentication and Authorization in FHIR APIs’ appeared first on Security Boulevard.

article thumbnail

GUEST ESSAY: How the FIDO Alliance helps drive the move to passwordless authentication

The Last Watchdog

This traditional authentication method is challenging to get rid of, mostly because it’s so common. And for businesses, transitioning to new authentication solutions can be expensive and time-consuming. It supports standards that make implementing newer, stronger authentication methods possible for businesses.

article thumbnail

Twitter and two-factor authentication: What's changing?

Malwarebytes

From March 19, users of Twitter won’t be able to use SMS-based two-factor authentication (2FA) unless they have a subscription to the paid Twitter Blue service. You can still use the authentication app and security key methods. To avoid losing access to Twitter, remove text message two-factor authentication by Mar 19, 2023.