Remove CISO Remove Phishing Remove Technology Remove Webinar
article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Sites

Duo's Security Blog

So for many IT teams, the news that tech giants are steadily embracing passkey technology is exciting. We’ve been answering these questions in this blog series by unpacking the pros and cons of passkey technology from different authentication perspectives. An alternate site cannot be substituted, mitigating the threat of phishing.

article thumbnail

What's the Buzz on Passwordless?

Duo's Security Blog

Advisory CISO J. Wolfgang Goerlich details in our white paper, Passwordless: The Future of Authentication , how pairing passwordless technology with strong MFA to protect access across cloud and on-prem is a practical way to provide the broadest security coverage today. No Phishing, Please See the video at the blog post.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Remote Working One Year On: What the Future Holds for Cybersecurity

Security Boulevard

In late 2020, HelpSystems research with CISOs of global financial organizations revealed that 45% of respondents reported an increase in cyber-attacks since the pandemic first emerged. Almost half the CISOs in the HelpSystems’ research admitted that they had already increased their investment in secure collaboration tools. Featured: .

article thumbnail

3 Steps to Prevent a Case of Compromised Credentials

Duo's Security Blog

In our previous two features, we covered the dangers of phishing (one method of credential compromise) and how to mitigate its impact on users. These habits highlight the need for more modern password technology and stronger authentication methods. Today, we cover best practices for an environment that has been compromised.

article thumbnail

How to Enhance Data Loss Prevention in Office 365

Security Boulevard

Recent HelpSystems research with CISOs in global financial service organizations found that almost one-third believe data breaches have the potential to cause the most damage over the next 12 months. Most important is the Adaptive Redaction technology within the Clearswift DLP. Request a Demo. Additional Resources. Featured: .

article thumbnail

Top 8 Cyber Insurance Companies for 2022

eSecurity Planet

Cyberattacks are not only a technological problem for companies, but they also represent a very real financial threat. Currently, cyber insurance is experiencing a ‘hard’ market, meaning that prices are increasing and there is less capacity available,” said Erik Barnes, Senior Underwriter, Cyber & Technology at AXA XL.

article thumbnail

Clone of How to Enhance Data Loss Prevention in Office 365

Security Boulevard

Recent HelpSystems research with CISOs in global financial service organizations found that almost one-third believe data breaches have the potential to cause the most damage over the next 12 months. Most important is the Adaptive Redaction technology within the Clearswift DLP. tag='></a> <a href='/blog?tag='></a>