I came across an article last week that indicated there was a successful attack on Microsoft’s Office 365 and Google’s G Suite environments that was able to bypass multi-factor authentication (MFA).
Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She provides cybersecurity publication consulting services to organizations and was formerly a senior computer scientist for the ...
With cyberattacks continuing to plague the financial services industry, the New York Department of Financial Services (NYDFS) recently released new guidance for regulated entities related to the use ...
A surge in credential-based cyberattacks is prompting security experts to call for stronger identity defenses, including advanced multi-factor authentication (MFA) and Identity Threat Detection and ...
Multi-Factor Authentication (MFA) has become a cornerstone of access security, offering an extra layer of defense against cyber threats. However, despite its effectiveness, MFA is not impervious to ...
Why do we need a new approach to authentication? Bypassing existing MFA techniques to garner employee credentials or to take over employee accounts has become child's play for attackers. There are ...
Ransomware threats are now targeting increasingly more organizations. IT teams must swiftly take proactive steps to protect data and applications, which have become a high-value target for attackers.
The adoption and implementation of multi-factor authentication and single sign-on security protocols at federal agencies has hit myriad roadblocks amid the government’s push to fully embrace the ...
Tyler Derickson is the cybersecurity and systems administrator for Arbor Park School District 145 in Oak Forest, Ill. At just 20 years old, he applies his dedication and passion for cybersecurity to ...
The team found only 5% of multifactor authentication push attacks were successful but it didn’t take many attempts to convince these victims to accept the push. The latest Cisco Talos report showed ...