Remove InfoSec Remove Passwords Remove VPN Remove Workshop
article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

.” – Richard Hall, Senior Director IT Infrastructure and Operations, Financial Force Phase 3: Enabling access to apps Enable access to applications with VPN-less access (e.g., For strategic guidance and access to hands-on labs, register for one of our free Zero Trust Workshops. ZTNA) – regardless of location or protocol.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Blocking legitimate users is part of that problem, blocking users wanting to protect their traffic with a VPN is another: This has been there for the past year now. They also blacklist vpn IP addresses. This is poor form as it can break tools that encourage good security practices such as password managers.

Hacking 279