article thumbnail

What Were the Best Cybersecurity Webinars of 2021?

CyberSecurity Insiders

So, we’ve compiled the highest rated, ranked by your peers, (ISC)² cybersecurity webinars from 2021. Our webinars have maintained consistent popularity and have have increased in viewership by more than 70% year-over-year growth this year. ISC)² members can receive CPE credits automatically for viewing webinars. Go Dox Yourself!

article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Sites

Duo's Security Blog

Nobody likes passwords. And is it realistic to consider passkeys – and the passwordless solutions they support – as a valid alternative for traditional password security? And is it realistic to consider passkeys – and the passwordless solutions they support – as a valid alternative for traditional password security?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Platforms

Duo's Security Blog

But conventional protection solutions, like password security, fall short when it comes to efficacy. We have a lot of thoughts on passkeys – some of which we’ve shared in other posts in this passkey blog series – and today we’re going to explore how passkeys stack up against passwords from the perspective of cloud platforms.

article thumbnail

Don’t Bet on Passwords: Using MFA to Make Insuring Your Security Less of a Gamble

Duo's Security Blog

By this point, we’re all familiar with the list of requirements for a strong password: unique, long, memorable, free from any personal information… But even the strongest passwords can pose a risk if they’re the only thing standing between your users and enterprise content.

article thumbnail

FIDO - Leading the Zero Trust Passwordless Authentication Evolution

Thales Cloud Protection & Licensing

FIDO - Leading the Zero Trust Passwordless Authentication Evolution. It’s no secret that passwords have become one of the weakest links in enterprise security. A Zero Trust approach starts with Multi-Factor Authentication (MFA). The Role of Passwordless Authentication. Tue, 08/16/2022 - 06:32.

article thumbnail

Hardware-based PKI provides strong passwordless authentication

Thales Cloud Protection & Licensing

Hardware-based PKI provides strong passwordless authentication. The need to manage users and authenticators in a secure and timely way is important with any PKI-based deployment. Certificate-based and software authentication solutions and OTP. Simply put, strong authentication helps verify data security. PKI Management.

article thumbnail

3 Steps to Prevent a Case of Compromised Credentials

Duo's Security Blog

Your passwords are on the internet. Talks of passkeys, passphrases, and even password less all point in one direction: eroding faith in the previously trusty password tucked under your keyboard. These habits highlight the need for more modern password technology and stronger authentication methods.