01.10.2021 Views

Cyber Defense eMagazine October Edition for 2021

Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH

Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Thousands of Fortinet VPN Account Credentials Leaked<br />

Broad Adoption of Modern, Identity Provider-Agnostic Authentication Strategy Is the Inevitable and<br />

Future-Proof Solution.<br />

By Rajiv Pimplaskar, CRO, Veridium<br />

Fortinet confirmed that malicious actors have posted SSL-VPN access in<strong>for</strong>mation to 87,000 FortiGate<br />

SSL-VPN devices online.<br />

The breach is yet another stark reminder of today’s dangers with password-based systems. Enterprises<br />

and users are starting to adopt passwordless authentication methods like ‘phone as a token’ and FIDO2<br />

security keys <strong>for</strong> customer and Single Sign On (SSO) portals and enterprise applications. But even so,<br />

major vulnerabilities still exist across entire categories of use cases such as 3rd party sites, contractors,<br />

Virtual Private Networks (VPN) and Virtual Desktop Infrastructure (VDI) - all of which are particularly<br />

vulnerable in the current Work from Home (WFH) explosion.<br />

Companies need to adopt a more holistic modern Multi Factor Authentication (MFA) strategy that is<br />

identity provider agnostic and can operate across all use cases to build true resiliency and ensure cyber<br />

defense against such actors.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>October</strong> <strong>2021</strong> <strong>Edition</strong> 83<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!