Remove Authentication Remove CISO Remove Webinar
article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

Threat actors have dramatically escalated their attacks – targeting security controls like multi-factor authentication (MFA), conducting wily social engineering attacks and extorting businesses large and small with ransomware. For more information, check out our on-demand webinar Your Zero Trust Roadmap.

article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Sites

Duo's Security Blog

We’ve been answering these questions in this blog series by unpacking the pros and cons of passkey technology from different authentication perspectives. Today, we’re focusing on how passkeys compare to passwords when it comes to authenticating on cloud sites. A separate set of passkeys are required to authenticate into each site.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Don’t Bet on Passwords: Using MFA to Make Insuring Your Security Less of a Gamble

Duo's Security Blog

A password manager can go a long way in helping to simplify that process, but multi-factor authentication (MFA) security can help even more. Using MFA to make insuring your organization a safe bet In layman’s terms, multi-factor authentication is the practice of using two or more factors to verify the identity of users logging on.

article thumbnail

Water utility CISO offers tips to stay secure as IT and OT converge

SC Magazine

Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. The post Water utility CISO offers tips to stay secure as IT and OT converge appeared first on SC Media. Asaavedra32, CC BY-SA 3.0

CISO 82
article thumbnail

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Security Boulevard

And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Plus, learn why GenAI and data security have become top drivers of cyber strategies. Dive into six things that are top of mind for the week ending Oct. s cyber agency has found. As a result, the U.K.

article thumbnail

What's the Buzz on Passwordless?

Duo's Security Blog

At Duo, we're building a passwordless authentication solution that’s as easy to set up as it is to use – with our world-class security baked in. Your Journey Begins with Multi-Factor Authentication See the video at the blog post. Advisory CISO J. The passwordless future is sooner than you think. Our experts have you covered.

article thumbnail

Clarity and Transparency: How to Build Trust for Zero Trust

Cisco Security

As a product marketer, I spend most of my daily existence casting about for the perfect word to use in web copy, a webinar, or video script. In the Harvard Business Review’s “Begin with Trust ”, Frances Frei and Anne Morriss describe three key drivers for trust: authenticity, logic, and empathy.

Marketing 144