Remove Authentication Remove CISO Remove Phishing Remove Webinar
article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Sites

Duo's Security Blog

We’ve been answering these questions in this blog series by unpacking the pros and cons of passkey technology from different authentication perspectives. Today, we’re focusing on how passkeys compare to passwords when it comes to authenticating on cloud sites. An alternate site cannot be substituted, mitigating the threat of phishing.

article thumbnail

3 Steps to Prevent a Case of Compromised Credentials

Duo's Security Blog

Passwords are a weak point in modern-day secure authentication practices, with Verizon highlighting that almost 50% of breaches start with compromised credentials. In our previous two features, we covered the dangers of phishing (one method of credential compromise) and how to mitigate its impact on users. Likely not immediately.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What's the Buzz on Passwordless?

Duo's Security Blog

At Duo, we're building a passwordless authentication solution that’s as easy to set up as it is to use – with our world-class security baked in. Your Journey Begins with Multi-Factor Authentication See the video at the blog post. Advisory CISO J. No Phishing, Please See the video at the blog post.

article thumbnail

How MFA and Cyber Liability Insurance Effectively Manage Risk in Higher Education

Duo's Security Blog

Recently, while co-hosting a webinar that kicked off Cybersecurity Awareness Month, a panelist commented that cybersecurity and privacy are team sports on a campus, much like our athletic teams. The use of phishing to take over user accounts as a first step to gain access to a campus for a ransomware attack has been making the headlines.

article thumbnail

Remote Working One Year On: What the Future Holds for Cybersecurity

Security Boulevard

In late 2020, HelpSystems research with CISOs of global financial organizations revealed that 45% of respondents reported an increase in cyber-attacks since the pandemic first emerged. Almost half the CISOs in the HelpSystems’ research admitted that they had already increased their investment in secure collaboration tools. Featured: .

article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

Threat actors have dramatically escalated their attacks – targeting security controls like multi-factor authentication (MFA), conducting wily social engineering attacks and extorting businesses large and small with ransomware. For more information, check out our on-demand webinar Your Zero Trust Roadmap.

article thumbnail

What’s New in the Federal Zero Trust Strategy?

Duo's Security Blog

Imagine a shift away from logging into a “network” to having security seamlessly built into the network, and multi-factor authentication and authorization continuously performed at the application level on the fly — without users typing passwords. The vision being set forth by OMB is ambitious — but vital.