Remove Accountability Remove eBook Remove Risk
article thumbnail

Uncovering & Remediating Dormant Account Risk

Duo's Security Blog

Before diving into the specifics of dormant accounts, it's important to take a step back and discuss a prerequisite: gaining cross-platform visibility into identity and access management data. Without an accurate user inventory, it becomes difficult to identify and mitigate security risks. Why are dormant accounts a risk?

article thumbnail

New eBook: 4 Steps to Comprehensive Service Account Security

CyberSecurity Insiders

There are countless service accounts in any given organization. The number of these non-human accounts – and the number of applications that rely on them – is growing each day. These accounts can become high-risk assets that, if left unchecked, may enable threats to propagate throughout the network undetected.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer

The Last Watchdog

By signing up for Peerlyst, company decision makers focused on mitigating cyber risks, as well as vendor experts, academics and independent researchers, are provided with a personalized feed of content based on specific interests, as well as the topics and people you follow. I’m honored to be included. It’s easy to participate on Peerlyst.

InfoSec 37
article thumbnail

Duo vs. Fraudulent Device Registration

Duo's Security Blog

It is a well-known and established point that a password alone is not enough to secure an account. This type of attack is known as Account Manipulation: Device Registration. You can also check out this Duo help article that provides policy recommendations and directions for how to secure your accounts.

article thumbnail

Watching the Watchmen: Securing Identity Administrators

Duo's Security Blog

To be clear, all administrator accounts — regardless of use case — represent accounts with elevated levels of power and access and should be a focus of heightened security controls. Identity administrator accounts have elevated permissions to deploy, configure, and modify relevant identity systems.

article thumbnail

Turning Microsoft’s MFA Requirement for Azure Into an Epic Security Win With Duo

Duo's Security Blog

of account compromise attacks.” of account compromise attacks.” It combines Duo’s current authentication capabilities like MFA, Passwordless and SSO with powerful security insights into identity and device risk. As Microsoft points out in their announcement, MFA “can block more than 99.2% MFA “can block more than 99.2%

article thumbnail

Simplifying Compliance in the Complex U.S. FinServ Regulatory Landscape

Thales Cloud Protection & Licensing

It includes expectations for implementing comprehensive security programs, including risk assessments, incident response plans, periodic reporting, and controls like governance frameworks and application security protocols. Governance: Establishing accountability and enforcing policies.