This document provides an overview and agenda for a presentation on passwordless authentication. It discusses the growing threats of ransomware, phishing and hacking. It outlines the top 5 concerns organizations have with passwordless options like ease of deployment and legacy application support. It introduces the Secret Double Octopus authentication platform which provides a full passwordless solution that can integrate with existing identity infrastructure, support legacy applications and offer easy deployment and management in the cloud or on-premise.
How to 2FA-enable Open Source Applications (Extended Session)
Presented at: Open Source 101 at Home 2020
Presented by: Mike Schwartz, Gluu
Abstract: Your organization loves open source tools like Wordpress, SuiteCRM, NextCloud, RocketChat, and OnlyOffice... but most of these tools are protected with plain old passwords. You want to use two-factor authentication... but how? In this workshop, you'll learn:
- Which 2FA technologies can be used without paying a license;
- How to enable users to enroll and delete 2FA credentials;
- How to configure open source applications to act as a federated relying party--delegating authentication to a central service
- How custom applications can act as a federated relying party
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
A presentation by Giuseppe "Gippa" Paternò", GARL Director, at Brighton event "Open Source, the Cloud and your business" on 18th November 2014
Enterprise secure identity in the cloud with Single Sign On and Strong Authentication
How to 2FA-enable Open Source Applications (Extended Session)
Presented at: Open Source 101 at Home 2020
Presented by: Mike Schwartz, Gluu
Abstract: Your organization loves open source tools like Wordpress, SuiteCRM, NextCloud, RocketChat, and OnlyOffice... but most of these tools are protected with plain old passwords. You want to use two-factor authentication... but how? In this workshop, you'll learn:
- Which 2FA technologies can be used without paying a license;
- How to enable users to enroll and delete 2FA credentials;
- How to configure open source applications to act as a federated relying party--delegating authentication to a central service
- How custom applications can act as a federated relying party
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
A presentation by Giuseppe "Gippa" Paternò", GARL Director, at Brighton event "Open Source, the Cloud and your business" on 18th November 2014
Enterprise secure identity in the cloud with Single Sign On and Strong Authentication
La sécurité n’est plus un add-on au système d’information, mais doit s’intégrer à tous les niveaux, depuis son architecture jusqu’à la résolution d’incidents, en passant par l’exploitation au quotidien des centres de données. Dans un contexte de mobilité accrue et en considérant l’émergence d’un modèle d’informatique à la demande, la sécurité repose autant sur la prévention technique que sur l’éducation comportementale des utilisateurs et sur la capacité des systèmes à résister aux attaques Session présentée par le partenaire : DELL.
Speakers : Florian Malecki (DELL)
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
As cyber attacks have matured and become more complex over the last number of years, the objective of most attacks has not changed: compromise and collect user credentials. This session will explore the changing cybersecurity landscape and how managing identity – both in the enterprise as well as across 3rd party applications - is becoming job #1 in managing your organization’s risk.
Pequeña presentación sobre más opciones de seguridad de Microsoft Windows 10. Esta charla está englobada dentro de un ciclo de micro-charlas de seguridad de cliente Windows.
What is IT supposed to provision access to in 2016? What is important and how can you increase your business's security and efficiency in the process? This guide explains.
Threats have never been more relevant than they are today. Nation states, adversaries, corporate and government espionage, hackers, etc. are all on the hunt for valuable information. The information they seek includes enterprise and individual details. Networks are only as secure as their weakest components. With the hyper-growth in connected devices including smart phones, tablets, wearables and Internet of Things (IoT) devices, networks are very vulnerable.
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
Duwayne Watson, a Cisco specialist from Ingram Micro, showcases various Data Security and Protection solutions such as: AMP, Umbrella, and CloudLock. These solutions can help your business remain compliant with PIPEDA legislation.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
The global disruption due to the pandemic has massively impacted organizations and the way they function.
Organizations are shifting towards a virtual environment by adopting cloud and automation to support,
monitor, and deploy exceptional service to their end-users. But how to keep the end-users connected to the
digital workplace securely during disruption is a big challenge
CTE Ottawa Seminar Day - September 7th, 2012
Indeed, these are exciting times. The IT world is yet again taking another giant technological step forward. With the release of System Center 2012, Cloud services, and Server 2012, to name a few, IT Pros are quickly trying to ramp up their skills for this latest generation of products. Now Windows 8 is upon us and not since Windows 95 have we seen a major overhaul of the user interface.
Much has been said and published about Microsoft's latest client OS. Join us at CTE to take an honest "Enterprise" look under the hood of Windows 8 so that we can tackle hot topics like improvements for deployment, security, usability, reliability, compatibility, virtual desktop infrastructure, networking, etc.
Think differently about security. Perimeter defenses are failing to protect customers. Hackers are getting smarter, more persistent and better organized. So must you.
Securing the laptop with SafeNet & Sophos
With almost daily disclosures of data leaks and spying activities, it should be clear that simple password protection is a thing of the past. To secure your information, especially on computers that leave the office, two factor authentication should be a requirement.
Whatever security you use, it is important that it is easy, comprehensive, not hampering productivity, and can be used in the field.
Zoom is a comprehensive platform designed to connect individuals and teams efficiently. With its user-friendly interface and powerful features, Zoom has become a go-to solution for virtual communication and collaboration. It offers a range of tools, including virtual meetings, team chat, VoIP phone systems, online whiteboards, and AI companions, to streamline workflows and enhance productivity.
La sécurité n’est plus un add-on au système d’information, mais doit s’intégrer à tous les niveaux, depuis son architecture jusqu’à la résolution d’incidents, en passant par l’exploitation au quotidien des centres de données. Dans un contexte de mobilité accrue et en considérant l’émergence d’un modèle d’informatique à la demande, la sécurité repose autant sur la prévention technique que sur l’éducation comportementale des utilisateurs et sur la capacité des systèmes à résister aux attaques Session présentée par le partenaire : DELL.
Speakers : Florian Malecki (DELL)
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
As cyber attacks have matured and become more complex over the last number of years, the objective of most attacks has not changed: compromise and collect user credentials. This session will explore the changing cybersecurity landscape and how managing identity – both in the enterprise as well as across 3rd party applications - is becoming job #1 in managing your organization’s risk.
Pequeña presentación sobre más opciones de seguridad de Microsoft Windows 10. Esta charla está englobada dentro de un ciclo de micro-charlas de seguridad de cliente Windows.
What is IT supposed to provision access to in 2016? What is important and how can you increase your business's security and efficiency in the process? This guide explains.
Threats have never been more relevant than they are today. Nation states, adversaries, corporate and government espionage, hackers, etc. are all on the hunt for valuable information. The information they seek includes enterprise and individual details. Networks are only as secure as their weakest components. With the hyper-growth in connected devices including smart phones, tablets, wearables and Internet of Things (IoT) devices, networks are very vulnerable.
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
Duwayne Watson, a Cisco specialist from Ingram Micro, showcases various Data Security and Protection solutions such as: AMP, Umbrella, and CloudLock. These solutions can help your business remain compliant with PIPEDA legislation.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
The global disruption due to the pandemic has massively impacted organizations and the way they function.
Organizations are shifting towards a virtual environment by adopting cloud and automation to support,
monitor, and deploy exceptional service to their end-users. But how to keep the end-users connected to the
digital workplace securely during disruption is a big challenge
CTE Ottawa Seminar Day - September 7th, 2012
Indeed, these are exciting times. The IT world is yet again taking another giant technological step forward. With the release of System Center 2012, Cloud services, and Server 2012, to name a few, IT Pros are quickly trying to ramp up their skills for this latest generation of products. Now Windows 8 is upon us and not since Windows 95 have we seen a major overhaul of the user interface.
Much has been said and published about Microsoft's latest client OS. Join us at CTE to take an honest "Enterprise" look under the hood of Windows 8 so that we can tackle hot topics like improvements for deployment, security, usability, reliability, compatibility, virtual desktop infrastructure, networking, etc.
Think differently about security. Perimeter defenses are failing to protect customers. Hackers are getting smarter, more persistent and better organized. So must you.
Securing the laptop with SafeNet & Sophos
With almost daily disclosures of data leaks and spying activities, it should be clear that simple password protection is a thing of the past. To secure your information, especially on computers that leave the office, two factor authentication should be a requirement.
Whatever security you use, it is important that it is easy, comprehensive, not hampering productivity, and can be used in the field.
Zoom is a comprehensive platform designed to connect individuals and teams efficiently. With its user-friendly interface and powerful features, Zoom has become a go-to solution for virtual communication and collaboration. It offers a range of tools, including virtual meetings, team chat, VoIP phone systems, online whiteboards, and AI companions, to streamline workflows and enhance productivity.
Atelier - Innover avec l’IA Générative et les graphes de connaissancesNeo4j
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Allez au-delà du battage médiatique autour de l’IA et découvrez des techniques pratiques pour utiliser l’IA de manière responsable à travers les données de votre organisation. Explorez comment utiliser les graphes de connaissances pour augmenter la précision, la transparence et la capacité d’explication dans les systèmes d’IA générative. Vous partirez avec une expérience pratique combinant les relations entre les données et les LLM pour apporter du contexte spécifique à votre domaine et améliorer votre raisonnement.
Amenez votre ordinateur portable et nous vous guiderons sur la mise en place de votre propre pile d’IA générative, en vous fournissant des exemples pratiques et codés pour démarrer en quelques minutes.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
Looking for a reliable mobile app development company in Noida? Look no further than Drona Infotech. We specialize in creating customized apps for your business needs.
Visit Us For : https://www.dronainfotech.com/mobile-application-development/
Transform Your Communication with Cloud-Based IVR SolutionsTheSMSPoint
Discover the power of Cloud-Based IVR Solutions to streamline communication processes. Embrace scalability and cost-efficiency while enhancing customer experiences with features like automated call routing and voice recognition. Accessible from anywhere, these solutions integrate seamlessly with existing systems, providing real-time analytics for continuous improvement. Revolutionize your communication strategy today with Cloud-Based IVR Solutions. Learn more at: https://thesmspoint.com/channel/cloud-telephony
Utilocate offers a comprehensive solution for locate ticket management by automating and streamlining the entire process. By integrating with Geospatial Information Systems (GIS), it provides accurate mapping and visualization of utility locations, enhancing decision-making and reducing the risk of errors. The system's advanced data analytics tools help identify trends, predict potential issues, and optimize resource allocation, making the locate ticket management process smarter and more efficient. Additionally, automated ticket management ensures consistency and reduces human error, while real-time notifications keep all relevant personnel informed and ready to respond promptly.
The system's ability to streamline workflows and automate ticket routing significantly reduces the time taken to process each ticket, making the process faster and more efficient. Mobile access allows field technicians to update ticket information on the go, ensuring that the latest information is always available and accelerating the locate process. Overall, Utilocate not only enhances the efficiency and accuracy of locate ticket management but also improves safety by minimizing the risk of utility damage through precise and timely locates.
Takashi Kobayashi and Hironori Washizaki, "SWEBOK Guide and Future of SE Education," First International Symposium on the Future of Software Engineering (FUSE), June 3-6, 2024, Okinawa, Japan
Software Engineering, Software Consulting, Tech Lead, Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Transaction, Spring MVC, OpenShift Cloud Platform, Kafka, REST, SOAP, LLD & HLD.
Launch Your Streaming Platforms in MinutesRoshan Dwivedi
The claim of launching a streaming platform in minutes might be a bit of an exaggeration, but there are services that can significantly streamline the process. Here's a breakdown:
Pros of Speedy Streaming Platform Launch Services:
No coding required: These services often use drag-and-drop interfaces or pre-built templates, eliminating the need for programming knowledge.
Faster setup: Compared to building from scratch, these platforms can get you up and running much quicker.
All-in-one solutions: Many services offer features like content management systems (CMS), video players, and monetization tools, reducing the need for multiple integrations.
Things to Consider:
Limited customization: These platforms may offer less flexibility in design and functionality compared to custom-built solutions.
Scalability: As your audience grows, you might need to upgrade to a more robust platform or encounter limitations with the "quick launch" option.
Features: Carefully evaluate which features are included and if they meet your specific needs (e.g., live streaming, subscription options).
Examples of Services for Launching Streaming Platforms:
Muvi [muvi com]
Uscreen [usencreen tv]
Alternatives to Consider:
Existing Streaming platforms: Platforms like YouTube or Twitch might be suitable for basic streaming needs, though monetization options might be limited.
Custom Development: While more time-consuming, custom development offers the most control and flexibility for your platform.
Overall, launching a streaming platform in minutes might not be entirely realistic, but these services can significantly speed up the process compared to building from scratch. Carefully consider your needs and budget when choosing the best option for you.
Do you want Software for your Business? Visit Deuglo
Deuglo has top Software Developers in India. They are experts in software development and help design and create custom Software solutions.
Deuglo follows seven steps methods for delivering their services to their customers. They called it the Software development life cycle process (SDLC).
Requirement — Collecting the Requirements is the first Phase in the SSLC process.
Feasibility Study — after completing the requirement process they move to the design phase.
Design — in this phase, they start designing the software.
Coding — when designing is completed, the developers start coding for the software.
Testing — in this phase when the coding of the software is done the testing team will start testing.
Installation — after completion of testing, the application opens to the live server and launches!
Maintenance — after completing the software development, customers start using the software.
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Crescat
Crescat is industry-trusted event management software, built by event professionals for event professionals. Founded in 2017, we have three key products tailored for the live event industry.
Crescat Event for concert promoters and event agencies. Crescat Venue for music venues, conference centers, wedding venues, concert halls and more. And Crescat Festival for festivals, conferences and complex events.
With a wide range of popular features such as event scheduling, shift management, volunteer and crew coordination, artist booking and much more, Crescat is designed for customisation and ease-of-use.
Over 125,000 events have been planned in Crescat and with hundreds of customers of all shapes and sizes, from boutique event agencies through to international concert promoters, Crescat is rigged for success. What's more, we highly value feedback from our users and we are constantly improving our software with updates, new features and improvements.
If you plan events, run a venue or produce festivals and you're looking for ways to make your life easier, then we have a solution for you. Try our software for free or schedule a no-obligation demo with one of our product specialists today at crescat.io
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Łukasz Chruściel
No one wants their application to drag like a car stuck in the slow lane! Yet it’s all too common to encounter bumpy, pothole-filled solutions that slow the speed of any application. Symfony apps are not an exception.
In this talk, I will take you for a spin around the performance racetrack. We’ll explore common pitfalls - those hidden potholes on your application that can cause unexpected slowdowns. Learn how to spot these performance bumps early, and more importantly, how to navigate around them to keep your application running at top speed.
We will focus in particular on tuning your engine at the application level, making the right adjustments to ensure that your system responds like a well-oiled, high-performance race car.
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeAftab Hussain
Understanding variable roles in code has been found to be helpful by students
in learning programming -- could variable roles help deep neural models in
performing coding tasks? We do an exploratory study.
- These are slides of the talk given at InteNSE'23: The 1st International Workshop on Interpretability and Robustness in Neural Software Engineering, co-located with the 45th International Conference on Software Engineering, ICSE 2023, Melbourne Australia
OpenMetadata Community Meeting - 5th June 2024OpenMetadata
The OpenMetadata Community Meeting was held on June 5th, 2024. In this meeting, we discussed about the data quality capabilities that are integrated with the Incident Manager, providing a complete solution to handle your data observability needs. Watch the end-to-end demo of the data quality features.
* How to run your own data quality framework
* What is the performance impact of running data quality frameworks
* How to run the test cases in your own ETL pipelines
* How the Incident Manager is integrated
* Get notified with alerts when test cases fail
Watch the meeting recording here - https://www.youtube.com/watch?v=UbNOje0kf6E
5. Ransomware
CISA/FBI/NSAAdvisory (Feb 22)
Cybercriminals increasingly gaining access to networks
via phishing, stolen RDP credentials or brute force, and
exploiting SW vulnerabilities
14 of the 16 US critical infrastructure sectors
# of attacks up 105% in ’21 (SonicWall)
Data leaks due to ransomware (+82%)
in ‘21 (CrowdStrike)
Avg ransom demand +36% to $6.1M
Attacks are up across the board
Phishing
25% of all data breaches involve phishing / 85% have
human element (Verizon ‘21 DBIR)
83% of orgs say they had a successful email-based phish
attack in ‘21 (vs 57% in ‘20)
+18% change in BEC attacks, +9% in bulk phishing
attacks, +13% change in spearphishing
6. MFA use is up, but not universal
Source: Cisco Duo
Use MFA
In 2017
28%
Use MFA
today
78%
Where is MFA used?
7. Passwordless MFA is Gaining Ground
If your organization does not have passwordless authentication, would your organization adopt it in
the near future?
Passwordless for employees and/or partners
What percent of your employees do
you expect to be using passwordless
one year from now?
What percent of your employees
use passwordless today?
11. Achieving the “Holy Grail” of
Passwordless
Maximum security of end users never having to remember a
password
IT takes responsibility of authentication of the hands of the end
user
No password left behind
Coverage for all use cases an end user encounters throughout
their hybrid work day
What do we mean by Full Passwordless?
13. Passwordless is not
a one shot deal
Start with desktop
MFA & Cloud apps
Windows and Macs
Add VPN
Remote users
Add kiosks and
shared desktops
VDI and other EUM
14. Octopus Authentication Platform
Full Passwordless™
OCTOPUS ENTERPRISE
OCTOPUS Lite
Extend your MFA
Authentication to Desktop
OCTOPUS STARTER
Remote Worker Security
(Traditional MFA)
OCTOPUS PRO
Desktop MFA + BYOD
(Traditional MFA)
Next Gen Authentication for Workforces
THE MOST POWERFUL AUTHENTICATION PLATFORM FOR POWERING
PASSWORDLESS JOURNEY
15. Octopus Enterprise
Innovative Flexibility Features
"PASSWORD FREE” MODE
User sets their password once and never has to remember it
User retains control of password
PASSWORDLESS WITH RETRIEVAL
User can get access to their system generated password in a pinch or when they
need it
Stored in the secure enclave and communicated to the mobile device through our
patented Quantum Safe secret sharing communication
PASSWORDLESS WITHOUT RETRIEVAL
User cannot see the system generated password ever
16. But I already have
existing IAM
Infrastructure
IDP/SSO AND POSSIBLY MFA
17. Deep Integration into Existing Hybrid Cloud
Environment
EXISTING IP/SSO PORTAL OR SDOS
Okta, Ping, ForgeRock, ADFS, etc
RADIUS OR SAML VPN SUPPORT
Unique FIDO key support for RADIUS VPNs
BYOA & INTEGRATED OTP SUPPORT
Support for Okta Verify and ForgeRock Authenticator
Support for RSA SecureD and other OT solutions
BROAD USER DIRECTORY SUPPORT
AD, Azure, Okta, ForgeRock, Google, etc.
18. Mac, Win 7 and Win 10 support
Highly reliable offline w/Octopus Authenticator
Complete support for FIDO2 keys, including
NFC and BLE
FileVault support on Mac
Passwordless Privilege User: Linux (ssh) and
Windows Server (RDP)
Desktop MFA:
Deep Support for
Mac & Win
23. Legacy Apps
are the #1 Inhibitor
to Passwordless
Source: Forrester, Q4 21
What is your biggest obstacle achieving passwordless for all
employees?
Source: Ponemon/Double Octopus ‘21 Study, Q3 21
Why would your organization not adopt passwordless
authentication?
24. Legacy Apps - Come in several sizes
Active Directory
join or not?
Beholden to the password in the user
Directory
1
SAML
enabled or not?
Capable of being federated
3
Localized DBMS
Manage their own username and
password in the application itself
2
25.
26. Octopus Quick Actions are a game changer
AVAILABLE ON
WINDOWS & MAC
Native UX feel
USER SELF-SERVICE
PORTALACCESS
Rapid self-service options
INTEGRATED BLE
INTERACTIONS
Injected clipboard actions
27. It has to be easy to
deploy and how will it
lower my TCO for IAM
29. Easy Deployment & User Onboarding
On-Premise Install System prerequisite
On-premise
Installation
service configuration
System ready for
Deployment
Cloud Install Remote AD Sync service configuration
System ready for
Deployment
User Deployment Enrollment Invitation
Enroll on mobile
app, FIDO
user's portal first
strong login
Windows/Mac login
Self Service
Email QR code sent
(Admin or Self-
service)
Mobile recovery Help-desk support
34. Thank You
For customer inquiries:
doubleoctopus.com/contact
doubleoctopus.com/request-a-demo
For channel inquiries or webinar reproduction:
marketing@doubleoctopus.com
Editor's Notes
Thanks for joining us
1st webinar of the year for us
Each speaker introduces themselves
How we structured the presentation
Provide a view of the latest
Top 5
Octopus Cloud – announced in Feb, released in Jan; Amit was Product executive when that was released
Ransomware
CISA/FBI/NSA Advisory (Feb 22)
Cybercriminals increasingly gaining access to networks via phishing, stolen RDP credentials or brute force, and exploiting SW vulnerabilities
14 of the 16 US critical infrastructure sectors
# of attacks up 105% in ’21 (SonicWall)
Data leaks due to ransomware (+82%) in ‘21 (CrowdStrike)
Avg ransom demand +36% to $6.1M
Phishing
25% of all data breaches involve phishing / 85% have human element (Verizon ‘21 DBIR)
83% of orgs say they had a successful email-based phish attack in ‘21 (vs 57% in ‘20)
+18% change in BEC attacks, +9% in bulk phishing attacks, +13% change in spearphishing
78% of users now use MFA, compared to 28% in 2017 (Duo)
2. Robustness examples
- Legacy application support