The (hard) key to stop phishing
How Cloudflare stopped a targeted attack and you can too
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
On July 20, 2022, Cloudflare was targeted in a sophisticated SMS phishing scheme that sent text messages to employees. These messages were disguised as official-looking communications, which included “cloudflare” and “okta” in the hacker-controlled domain
Improving security while keeping users productive has never been trickier because ransomware, phishing, shadow IT, and other threats have been exploding in volume and sophistication.
Join Cloudflare in this on-demand webinar where they walk through the entire chain of events in detail. They will discuss:
- Why not all MFA is treated equal and strengthened FIDO U2F / FIDO2 implementations like security keys can thwart phishing attacks
- How a ZTNA service like Cloudflare Access simplifies the rollout of strong authentication across all types of resources, even legacy apps
- Where Cloudflare’s Zero Trust platform played a role in mitigating this and similar attacks, from blocking the new domain to logging all authentications and killing active, compromised sessions
- How a “paranoid but blame-free” culture is critical for security and helps businesses move quickly during critical incidents.
Watch the webinar today.
Provided by Cloudflare
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
CVEs are set to top 50,000 this yearNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
81% of devs plan to migrate to OpenJDK as Oracle Java pricing concerns reach boiling pointNews Oracle Java pricing has developers scrambling for alternatives, and one open source option stands out
-
What security teams need to know about the NSA's new zero trust guidelinesNews The new guidelines aim to move an organization from discovery to target-level implementation of zero trust practices
-
Fears over “AI model collapse” are fueling a shift to zero trust data governance strategiesNews Gartner warns of "model collapse" as AI-generated data proliferates – and says organizations need to beware
-
How to MFA everywhereIndustry Insights Identity online is not who you are; it is what the system accepts as proof of you, and that gap is exactly what the attackers take advantage of
-
Microsoft opens up Entra Agent ID preview with new AI featuresNews Microsoft Entra Agent ID aims to help manage influx of AI agents using existing tools
-
Cisco ASA customers urged to take immediate action as NCSC, CISA issue critical vulnerability warningsNews Cisco customers are urged to upgrade and secure systems immediately
-
‘The worst thing an employee could do’: Workers are covering up cyber attacks for fear of reprisal – here’s why that’s a huge problemNews More than one-third of office workers say they wouldn’t tell their cybersecurity team if they thought they had been the victim of a cyber attack.
-
Research shows the financial benefits of implementing zero trustNews With zero trust shown to drastically reduce the number of cyber incidents, insurers are catching on and lowering premiums
-
Microsoft ramps up zero trust capabilities amid agentic AI pushNews The move from Microsoft looks to bolster agent security and prevent misuse
