Remove Authentication Remove Engineering Remove Webinar
article thumbnail

Targeted Malware Reverse Engineering Workshop follow-up. Part 1

SecureList

On April 8, 2021, we conducted a webinar with Ivan Kwiatkowski and Denis Legezo , Senior Security Researchers from our Global Research & Analysis Team (GReAT), who gave live workshops on practical disassembling, decrypting and deobfuscating authentic malware cases, moderated by GReAT’s own Dan Demeter.

article thumbnail

Human errors leading to an increase in cyber attacks on Maritime Industry

CyberSecurity Insiders

During a webinar conducted by Riviera, they revealed that the Human errors are causing an increase in cyber attacks on Maritime Industry. To all those who are concerned about the increase in cyber attacks on Maritime Industry, here’s an interesting finding to analyze.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Overview of Authentication Mechanisms

Thales Cloud Protection & Licensing

Overview of Authentication Mechanisms. In this regard, continuously authenticating users who are accessing corporate resources helps maintain trust in distributed IT environments. Let us examine some of the most prominent authentication mechanisms before we move on to the emerging continuous access evaluation protocol (CAEP) standard.

article thumbnail

Authentication Alone Is Failing: Introducing Continuous Identity Security

Duo's Security Blog

The security industry has diligently battled compromised credentials, evolving from passwords to multifactor authentication (MFA) to passwordless — our most secure and phishing-resistant method to date — and one that is fully supported in Duo. This means there are serious holes in our authentication armor today.

article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

Threat actors have dramatically escalated their attacks – targeting security controls like multi-factor authentication (MFA), conducting wily social engineering attacks and extorting businesses large and small with ransomware. For more information, check out our on-demand webinar Your Zero Trust Roadmap.

article thumbnail

9 Key Takeaways from Ask Us Anything: Passwordless Tips & Tricks

Duo's Security Blog

To help you make the most of this new offering, Duo Product Manager Chris Demundo and Product Marketing Manager Ted Kietzman recently hosted the webinar Ask Us Anything: Passwordless Tips & Tricks , answering passwordless questions crowdsourced from our Duo Community public forum. What is passwordless authentication?

article thumbnail

Protecting Your Universe from Third-Party Threats with Risk-Based Authentication & Verified Push

Duo's Security Blog

Risk-Based Authentication (RBA) intelligently leverages more secure forms of authentication—like verified push—to help organizations respond to risk and step-up security measures to frustrate attackers, not trusted users. How does Risk-Based authentication reduce third-party risk?