article thumbnail

Duo vs. Fraudulent Device Registration

Duo's Security Blog

That’s where multi-factor authentication (MFA) comes in. But what if an attacker can just send that authentication request to their own personal phone? For more information, on best security practices to protect against identity-based attacks, check out Duo’s new eBook, Securing Organizations Against Identity-Based Threats.

article thumbnail

The State of Passwordless in the Enterprise

Duo's Security Blog

Today we will discuss the survey makeup, review key results and explain why Duo’s Passwordless technology is well positioned to meet enterprise authentication needs highlighted in the study. Workforce authentication failures are common and MFA is still not mandatory Duo has always focused on meeting customers where they are.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Duo E-Book, Attack Vectors Decoded: Securing Organizations Against Identity-Based Threats

Duo's Security Blog

Recently, attackers have targeted multi-factor authentication (MFA). Even if an attacker has access to a username and password, they still need access to the second authentication factor to break into the organization. This becomes a constant cycle of organizations introducing new protections and attackers finding ways to exploit them.

article thumbnail

Retail and Hospitality Trending Holiday Cyber Threats

Duo's Security Blog

And in our ebook, Retail Cybersecurity: The Journey to Zero Trust , we share ways that Duo can help retailers improve their security posture. Add a passwordless authentication factor like a biometric and block attempts at access. Get started by downloading our ebook, Retail Cybersecurity: The Journey to Zero Trust , today.

Retail 78
article thumbnail

Abusing Entra ID Misconfigurations to Bypass MFA

NetSpi Technical

To understand the vulnerability, there are a few things to understand about the Entra ID authentication flow. Within any Entra ID environment, there are numerous cloud applications that are leveraged when a user authenticates. This odd load-time behavior is what alerted me to the potential for an MFA bypass.

article thumbnail

Why You Need a Control Plane for Machine Identity Management

Security Boulevard

Also, like humans, machines must be authenticated to be trusted. Once authenticated using their identity, the machine can then be authorized to access data or resources. Jeff recently posted a blog on Medium about how he sees the machine identity management market evolving over the coming months. Scott Carter. UTM Medium.

article thumbnail

How to Mitigate Ransomware Attacks with MFA

Duo's Security Blog

And for more information on protecting against ransomware, be sure to check out our ebook: Protecting Against Ransomware: Zero Trust Security for a Modern Workforce. Mitigating ransomware attacks using MFA Multi-factor authentication (MFA) is very effective at protecting credentials and limiting attackers’ access to company resources.