Remove Accountability Remove Authentication Remove eBook
article thumbnail

Uncovering & Remediating Dormant Account Risk

Duo's Security Blog

Before diving into the specifics of dormant accounts, it's important to take a step back and discuss a prerequisite: gaining cross-platform visibility into identity and access management data. And finally, individual users often have multiple accounts (Gmail, Yahoo, etc.) Why are dormant accounts a risk?

article thumbnail

Passkeys and The Beginning of Stronger Authentication

Thales Cloud Protection & Licensing

Passkeys and The Beginning of Stronger Authentication madhav Fri, 02/02/2024 - 05:23 How passkeys are rewriting the current threat landscape Lillian, an experienced CISO, surveyed the threat landscape. Lillian knew that a shift in authentication couldn't wait. FIDO is an overarching framework for secure and passwordless authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Duo vs. Fraudulent Device Registration

Duo's Security Blog

It is a well-known and established point that a password alone is not enough to secure an account. That’s where multi-factor authentication (MFA) comes in. But what if an attacker can just send that authentication request to their own personal phone? This type of attack is known as Account Manipulation: Device Registration.

article thumbnail

Turning Microsoft’s MFA Requirement for Azure Into an Epic Security Win With Duo

Duo's Security Blog

Starting next month, Microsoft announced that they will begin rolling out mandatory multi-factor authentication (MFA) sign-in for Azure (also known as Microsoft Entra ID) resources. of account compromise attacks.” of account compromise attacks.” As Microsoft points out in their announcement, MFA “can block more than 99.2%

article thumbnail

Identity-Based Attacks Are Evolving. Duo Can Help

Duo's Security Blog

These include exploiting service and dormant accounts, leveraging token authentication, enrolling new devices, and utilizing residential proxies. For example, Duo and Identity Intelligence can see when a dormant account attempts to enroll a new device from a personal VPN.

article thumbnail

News Alert: Survey shows vast majority of IT pros consider ‘passwordless’ access a top priority

The Last Watchdog

. – June 21, 2023 – Axiad , a leading provider of organization-wide passwordless orchestration, today announced the results of its Passwordless Authentication survey fielded by Enterprise Research Group (ERG), a full-service market research company. and Canada were surveyed.

article thumbnail

Retail and Hospitality Trending Holiday Cyber Threats

Duo's Security Blog

And in our ebook, Retail Cybersecurity: The Journey to Zero Trust , we share ways that Duo can help retailers improve their security posture. Add a passwordless authentication factor like a biometric and block attempts at access. Get started by downloading our ebook, Retail Cybersecurity: The Journey to Zero Trust , today.

Retail 121