Remove Authentication Remove Threat Detection Remove Webinar
article thumbnail

How to Make Threat Detection Better?

Anton on Security

I’ve lamented on this a few times, either touching on general difficulties with detection , its uncertainty or highlighting the fragile detections people write. Cloud authentication logs?) Can We Have “Detection as Code”?” Application traces? More to come!

article thumbnail

A Clear and Present Need: Bolster Your Identity Security with Threat Detection and Response

Duo's Security Blog

One piece of evidence to support this hypothesis is the low adoption of a basic security control that protects against identity-based attacks - multi-factor authentication (MFA). Add to this, the risks of weak authentication factors such as SMS one-time passcodes and dormant or inactive accounts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Essential Elements of an Identity Threat Detection and Response (ITDR) Strategy

Security Boulevard

Identity threat detection and response (IDTR) equips enterprises to protect digital identities along with the identity systems that manage them. And it's why identity threat detection and response (ITDR) should be part of every enterprise's security strategy. Digital identity data is a cybercriminal's favorite target.

article thumbnail

How to Make Threat Detection Better?

Security Boulevard

I’ve lamented on this a few times, either touching on general difficulties with detection , its uncertainty or highlighting the fragile detections people write. Here, I want to continue the conversation on detection quality. Cloud authentication logs?). Recent SANS Webinar on Detection. Application traces?

article thumbnail

New Duo Integrations Enhance Security Visibility and Threat Intelligence in SecureX Platform

Duo's Security Blog

Enhanced Security Visibility and Threat Intelligence When Duo launched Trust Monitor in November 2020, the idea was to highlight suspicious login activity and help SecOps investigate potentially compromised accounts. Looking for more information?

article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Platforms

Duo's Security Blog

Be sure to tune into our webinar, The State of Passkeys in the Enterprise , on September 7th at 9am PST | 12pm EST. Passkeys on Cloud Platforms Passkeys have growing support from significant vendors. This enables client-side support for passkey authentication.

Passwords 105
article thumbnail

Understanding Identity Acronyms: What Are ISPM & ITDR?

Duo's Security Blog

Given the complexity of policy, even the most advanced teams struggle to deploy, maintain and assess a strong access management policy posture standard that helps mitigate threats while also supporting a productive business. What is ITDR, or Identity Threat Detection & Response? Why is ITDR & ISPM important?