article thumbnail

Identity-Based Attacks Are Evolving. Duo Can Help

Duo's Security Blog

For example, Duo and Identity Intelligence can see when a dormant account attempts to enroll a new device from a personal VPN. If you're interested in learning more about how Duo can help you address evolving initial access techniques, check out our Securing Organizations Against Identity-Based Threats ebook.

article thumbnail

U.S. Bookstore giant Barnes & Noble hit by cyberattack

Security Affairs

The bookseller also operated the Nook Digital, which is a spin-off division that sells eBook and e-Reader platform. Over the weekend, users have been complaining on Nook’s Facebook page and Twitter that they were not able to access their library of purchased eBooks and magazine subscriptions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hybrid work is here to stay – but what does that mean for cybersecurity?

Cisco Security

Verify user identity and device trust with Cisco Secure Access by Duo and AnyConnect VPN. To go deeper into the Cisco Secure Hybrid Work solution, check out the eBook. Enable a Zero Trust approach to balance security and usability. Hold the first line of defense with DNS and email protection with Cisco Umbrella and Secure Email.

article thumbnail

Intro to Phishing: How Dangerous Is Phishing in 2023?

Duo's Security Blog

With Duo, the University team stood up integrations within days instead of the predicted weeks or months , protecting their apps and VPN. Moreover, they were incredibly complex to integrate with the University’s technology stack. Additional IT service headcount ended up being unnecessary.

Phishing 106
article thumbnail

Zero Trust Is a Journey and Businesses Have Many Rivers to Cross

Thales Cloud Protection & Licensing

“In the case of user efficiency, now with a full remote workflow for user authentication, all devices are authenticating over an enterprise VPN client. Utilizing a VPN model also creates the scenario where users must add another credential set to their running list of usernames and passwords to remember. More About This Author >.

article thumbnail

MSPs: Becoming the Trusted Cyber Insurance Advisor

Duo's Security Blog

Webinar: CyberCube and Duo Security Answer Top Cyber Insurance Questions For more on what insurers look for, check out our ebook Cyber Liability Insurance for Small and Medium Businesses for the essentials. And that will be very effective in bringing your insurance premiums down. What can Duo do?

article thumbnail

An interview with cyber threat hunter Hiep Hinh

Malwarebytes

It's easy to go after a bunch of indicators, like lists of hashes, looking for VPN and RDP tools, and looking for a lot of freeware stuff that generally is used during attacks, such as IP scanners.” Get the eBook : Is MDR right for my business? “It's easy to go after low hanging fruit. ” says Hiep. More MDR resources.