Remove Authentication Remove InfoSec Remove Webinar
article thumbnail

Still Using Passwords? Get Started with Phishing-Resistant, Passwordless Authentication Now!

Cisco Security

Going beyond the hype, passwordless authentication is now a reality. Cisco Duo’s passwordless authentication is now generally available across all Duo Editions. “ Cisco Duo simplifies the passwordless journey for organizations that want to implement phishing-resistant authentication and adopt a zero trust security strategy.

article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

Threat actors have dramatically escalated their attacks – targeting security controls like multi-factor authentication (MFA), conducting wily social engineering attacks and extorting businesses large and small with ransomware. For more information, check out our on-demand webinar Your Zero Trust Roadmap.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Navigating the SEC’s Cybersecurity Disclosure Rules: One Year On

Security Boulevard

As the rules were authorized in late 2023, we shared what we see as the implications for infosec leaders. Implementing zero trust means continuously verifying each user and device that attempts to access company resources, ensuring strict authentication, authorization and validation throughout the user session.

article thumbnail

Herjavec Group Wins 4 Cyber Defense Magazine Global InfoSec Awards

Herjavec Group

We accelerate the pillars of your Identity program in Governance & Administration, Privileged Access Management, and User Authentication. . About CDM InfoSec Awards . This is Cyber Defense Magazine’s ninth year of honoring global InfoSec innovators. Join a webinar at [link] and realize that infosec knowledge is power.

InfoSec 52
article thumbnail

Targeted Malware Reverse Engineering Workshop follow-up. Part 1

SecureList

On April 8, 2021, we conducted a webinar with Ivan Kwiatkowski and Denis Legezo , Senior Security Researchers from our Global Research & Analysis Team (GReAT), who gave live workshops on practical disassembling, decrypting and deobfuscating authentic malware cases, moderated by GReAT’s own Dan Demeter.

article thumbnail

Enabling Secure Code Signing at Scale

Thales Cloud Protection & Licensing

This starts from the build process and goes all the way through to the release in order to develop code that maintains a strong root of trust, and with a high degree of authenticity and integrity. If you would like more information about Thales Data Protection on Demand (DPoD) HSM or Thales Luna HSM.

InfoSec 93
article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

We constantly see new threats, and threat vectors, come and go; which puts a tremendous strain on the InfoSec teams that have to protect organizations and businesses from these threats. Active Lock protects individual files by requiring step-up authentication until the threat is cleared. Read more here. Read more here.