Remove Accountability Remove Authentication Remove eBook
article thumbnail

Passkeys and The Beginning of Stronger Authentication

Thales Cloud Protection & Licensing

Passkeys and The Beginning of Stronger Authentication madhav Fri, 02/02/2024 - 05:23 How passkeys are rewriting the current threat landscape Lillian, an experienced CISO, surveyed the threat landscape. Lillian knew that a shift in authentication couldn't wait. FIDO is an overarching framework for secure and passwordless authentication.

article thumbnail

Uncovering & Remediating Dormant Account Risk

Duo's Security Blog

Before diving into the specifics of dormant accounts, it's important to take a step back and discuss a prerequisite: gaining cross-platform visibility into identity and access management data. And finally, individual users often have multiple accounts (Gmail, Yahoo, etc.) Why are dormant accounts a risk?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Duo vs. Fraudulent Device Registration

Duo's Security Blog

It is a well-known and established point that a password alone is not enough to secure an account. That’s where multi-factor authentication (MFA) comes in. But what if an attacker can just send that authentication request to their own personal phone? This type of attack is known as Account Manipulation: Device Registration.

article thumbnail

Turning Microsoft’s MFA Requirement for Azure Into an Epic Security Win With Duo

Duo's Security Blog

Starting next month, Microsoft announced that they will begin rolling out mandatory multi-factor authentication (MFA) sign-in for Azure (also known as Microsoft Entra ID) resources. of account compromise attacks.” of account compromise attacks.” As Microsoft points out in their announcement, MFA “can block more than 99.2%

article thumbnail

Are You Vulnerable To Ransomware? 6 Questions to Ask Yourself

Vipre

Your security strategy must take into account all the devices that access your network, which means all laptops, smartphones and tablets should be secured. You also should consider encryption and strong authentication policies for added protection. Download: SMBs Under Attack eBook. Do you have a patch management policy?

article thumbnail

Abusing Entra ID Misconfigurations to Bypass MFA

NetSpi Technical

To understand the vulnerability, there are a few things to understand about the Entra ID authentication flow. Within any Entra ID environment, there are numerous cloud applications that are leveraged when a user authenticates. Image 1: Require Duo MFA Conditional access policy in a vulnerable state.

article thumbnail

Watching the Watchmen: Securing Identity Administrators

Duo's Security Blog

To be clear, all administrator accounts — regardless of use case — represent accounts with elevated levels of power and access and should be a focus of heightened security controls. Identity administrator accounts have elevated permissions to deploy, configure, and modify relevant identity systems.