multi-factor authentication
Ingredients Needed to Manage Network Tribbles
Cybersecurity – the final frontier, these are the trials and tribulations that network admins face on an ongoing basis. Sometimes it feels like network admins are Starfleet captains navigating unknown galaxies as the infrastructure of organizations become more complex. Using a complicated mix of cl…
Why Collaboration IT Administrators Trust Webex
Built on Security We understand the responsibility you entrust to us when you pick Cisco Collaboration. You are trusting us with your most confidential information: customer data, patient and HR information, competitive and marketing strategy. Let’s face it, we know confidential conversations…
The One-Two Punch of User and Device Trust
Multi-factor authentication (MFA) is a proven method through which to ensure you’re verifying the identity of users who are accessing applications. It uses strong two-factor authentication to ensure your users are who they say they are. But trusting users is only one component of the trusted access…
The Zero Trust Games are here!
Every year at RSA Conference, a pitched battle ensues for the heart and soul of the security practitioner. Or at least for the mind: there’s the word cloud of topics that show up most often in the CFP submissions, but there are more slogans, phrases and concepts that meet in the expo hall to fight f…
Protecting Cisco AnyConnect VPN & Cloud Applications With Duo’s MFA
This blog post is the first in a three-part series on how Duo’s MFA integrates with Cisco AnyConnect VPN. Organizations are facing a major technology shift. They’re in the process of moving many of their on-premises workloads and applications to the cloud. But the transition to cloud isn’t as simple…
New Year, Same Reality: How Much Will Security Actually Change in 2019
If we look back at the security landscape of 2018, there were some interesting highs and lows. There were a number of large-scale breaches in the news attributed to hackers, involving notable companies. All indications for 2019 don’t show any signs of this activity stopping or slowing down. In fact…
Securing Access to Our Nation’s Critical Infrastructure
It’s Critical Infrastructure Security and Resilience Month, but I think we can all agree that the topic at hand is, uh, more of a long-term necessity. About 85 percent of the nation’s critical infrastructures are privately owned and operated, as cited in NIST’s SP 800-82 Guide to I…