article thumbnail

What Were the Best Cybersecurity Webinars of 2021?

CyberSecurity Insiders

So, we’ve compiled the highest rated, ranked by your peers, (ISC)² cybersecurity webinars from 2021. Our webinars have maintained consistent popularity and have have increased in viewership by more than 70% year-over-year growth this year. ISC)² members can receive CPE credits automatically for viewing webinars. Go Dox Yourself!

article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Platforms

Duo's Security Blog

We have a lot of thoughts on passkeys – some of which we’ve shared in other posts in this passkey blog series – and today we’re going to explore how passkeys stack up against passwords from the perspective of cloud platforms. Google Password Manager On Android, the Google Password Manager provides backup and syncs passkeys.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Don’t Bet on Passwords: Using MFA to Make Insuring Your Security Less of a Gamble

Duo's Security Blog

After all, remembering hundreds of passwords that are 20+ characters long can be daunting. A password manager can go a long way in helping to simplify that process, but multi-factor authentication (MFA) security can help even more. Or, if you’d like to experience Duo MFA for yourself, sign up for our free 30-day trial.

article thumbnail

Cybersecurity Awareness Month Focuses on People

SecureWorld News

For Amazon, cybersecurity is a top priority, said Jenny Brinkley, Director, Amazon Security, who was one of the webinar panelists. Another theme touched on in the webinar was to m ake awareness education easy, like you're talking to a teenager: "I like to think about how I explain this to my own family," Shou said. Updating software.

article thumbnail

Hardware-based PKI provides strong passwordless authentication

Thales Cloud Protection & Licensing

Seamless password management: With PKI in place, password management is simple, which lowers the cost of maintenance in implementing and managing password policies. To learn more about PKI, watch our recent joint webinar with Versasec. The result is improved convenience and efficiency.

article thumbnail

3 Steps to Prevent a Case of Compromised Credentials

Duo's Security Blog

The answer, like most other cybersecurity-adjacent answers, lies in a combination of factors including social engineering , weak passwords, and other risky security moves or attacks. User-generated passwords can be deceptively weak, with less caution given to password management as remote and hybrid work become more common.

article thumbnail

Passkeys vs. Passwords: The State of Passkeys With Remote Users

Duo's Security Blog

Therefore, we can measure the state, or progress, of passkeys adoption by their readiness to replace passwords. Security Longer passwords with more character options make it harder to decipher or calculate in brute force attacks. If you are new to passkeys, you can get up to speed with our primer: What Are Passkeys?

Passwords 114