Remove Authentication Remove Blog Remove Passwords Remove VPN
article thumbnail

Hackers Leak 87,000 Fortinet VPN Passwords

eSecurity Planet

Fortinet confirmed the veracity of the hackers’ claims in a blog post today. The network security vendor said the credentials were stolen from systems that remain unpatched against a two-year-old vulnerability – CVE-2018-13379 – or from users who patched that vulnerability but failed to change passwords.

VPN 114
article thumbnail

Revolutionizing Cisco VPN Access with Duo SSO

Duo's Security Blog

Secure Cisco VPN logins in less than an hour Authenticate users in seconds Verify user + device posture Blog unmanaged devices Mitigate modern security threats with phishing-resistant authentication Join the thousands of Cisco firewall customers who take advantage of protecting Cisco VPN logins with Cisco Duo Single Sign-On via SAML 2.0

VPN 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Legacy Authentication Protocols: Why RADIUS Is (Still) Important

Duo's Security Blog

When reading the title of this blog, you might be wondering to yourself why RADIUS is being highlighted as a subject — especially amidst all of the advancements of modern authentication we see taking place recently. It is commonly used for network access into VPNs, wireless access points, and other devices (more on this later).

article thumbnail

One Identity Guest Blog – The password checklist

IT Security Guru

For those systems that are not, such as smaller non-critical businesses, or personal online accounts, good password hygiene is still very important. . ? . A few years back, I received an opportunity to comment on an Instagram customer account breach where the attacker had gained access to some usernames and passwords.

article thumbnail

Authentication Alone Is Failing: Introducing Continuous Identity Security

Duo's Security Blog

The security industry has diligently battled compromised credentials, evolving from passwords to multifactor authentication (MFA) to passwordless — our most secure and phishing-resistant method to date — and one that is fully supported in Duo. This means there are serious holes in our authentication armor today.

article thumbnail

Announcing Duo’s Vision to Streamline Authentication & Enhance User Experience

Duo's Security Blog

Some of it is positive, but the general consensus is that people don’t love multi-factor authentication (MFA); they see it as a necessary evil at best. That’s why I’m so excited to announce our vision to streamline Duo’s authentication workflows, a feature that will deliver seamless, secure login experiences.

article thumbnail

Passwords vs. Passkeys: The State of Passkeys on User Endpoints

Duo's Security Blog

And when it comes to managing access for this plethora of devices, password security just isn’t cutting it anymore. In our recent passkey blog series , we’ve been unpacking the difference between new passkey technology and more conventional password security in light of some of the most critical authentication scenarios.