Remove introducing-risk-based-authentication
article thumbnail

Trying to Find a Balance: Introducing Risk-Based Authentication

Duo's Security Blog

These challenges make it hard to follow the most secure practices: employing the most secure authentication methods, requiring constant re-authentication and only allowing access from corporate devices. Risk-Based Authentication assesses user and device telemetry to identify known threat patterns and high-risk anomalies.

article thumbnail

GUEST ESSAY: Best practices to shrink the ever-present risk of Exchange Server getting corrupted

The Last Watchdog

One critical issue faced by organizations that rely on Exchange Server is the risk of a corrupt Exchange Server database cropping up. Navigating new risks Today, heavy reliance on cloud-centric IT infrastructure and cloud-hosted applications has become the norm. Here are a few ‘dos:’ •Rigorous vulnerability management.

Risk 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Duo E-Book, Attack Vectors Decoded: Securing Organizations Against Identity-Based Threats

Duo's Security Blog

Identity-based cyberattacks are a challenge across all organizations, regardless of size, industry or technology. This becomes a constant cycle of organizations introducing new protections and attackers finding ways to exploit them. Recently, attackers have targeted multi-factor authentication (MFA).

article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Platforms

Duo's Security Blog

We have a lot of thoughts on passkeys – some of which we’ve shared in other posts in this passkey blog series – and today we’re going to explore how passkeys stack up against passwords from the perspective of cloud platforms. That’s why many tech companies are turning to passkeys as a more secure and convenient replacement.

article thumbnail

Why TOTP Won’t Cut It (And What to Consider Instead)

NetSpi Technical

In this article we’ll explore security risks of TOTP and an alternative 2FA method to increase security. Time-Based One-Time Password (TOTP) Time-Based One-Time Password (TOTP) is a common two-factor authentication (2FA) mechanism used across the internet. Once a token was issued, it was time-based.

article thumbnail

The Evolving Legislative and Compliance Landscape: A Roadmap for Business Leaders

Thales Cloud Protection & Licensing

This blog will briefly overview the most essential developments shaping the legislative and compliance environment. The DSA introduces tiered obligations based on platform size and reach. It offers greater flexibility with a customized approach, allowing businesses to tailor security controls to their specific risks.

Risk 71
article thumbnail

Administrator’s Guide, Part 3: What Makes Passwordless, Dare We Say It, Phish-Proof?

Duo's Security Blog

Part of our Administrator's Guide to Passwordless blog series See the video at the blog post. Yes, it’s a password-less authentication method, greatly streamlining the login experience, and while that’s a great incentive to use passwordless for logging in, it’s not an improvement in authentication security in and of itself.

Phishing 100