By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Two-factor and multifactor authentication strategies News
October 20, 2017
Google's Advanced Protection Program greatly increases the security of user accounts, but the usability tradeoffs may not be worth it for average users.
June 21, 2017
At the 2017 Cloud Identity Summit, Ping Identity launched a new software development kit that will embed multifactor authentication security features in mobile apps.
May 05, 2017
News roundup: Attackers exploit SS7 vulnerability and drain bank accounts. Plus, Trump signs government IT executive order, an Intel AMT flaw threatens millions and more.
April 07, 2017
CA Strong Authentication brings inexpensive multi- and two-factor authentication to businesses looking to protect mobile applications and devices and to prevent identity theft.
Two-factor and multifactor authentication strategies Get Started
Bring yourself up to speed with our introductory content
Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. Continue Reading
From cloud identity and access management to physical access control, this study guide will help you review key concepts from Domain 5 of the CISSP exam. Continue Reading
Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with ... Continue Reading
Evaluate Two-factor and multifactor authentication strategies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Bringing new application types and integration points into the enterprise, cloud can complicate user identity management. So, how can you be sure your data is secure? Continue Reading
The Microsoft Authenticator application enables smartphone-based, two-factor authentication and attempts to reduce the use of passwords. Expert Matthew Pascucci explains how. Continue Reading
Facebook's Delegated Recovery aims to replace knowledge-based authentication with third-party account verification. Expert Michael Cobb explains how this protocol works. Continue Reading
Manage Two-factor and multifactor authentication strategies
Learn to apply best practices and optimize your operations.
With a port swapping attack, hackers can bypass two-factor authentication and control a victim's mobile device. Judith Myerson explains how the attacks work and how to stop them. Continue Reading
Can two-factor authentication be applied to a mobile device that's used as a 2FA factor? Michael Cobb explores the different knowledge factors and uses for mobile devices. Continue Reading
Administrators can use multifactor authentication to lock down Office 365, but the newer Azure Active Directory PowerShell module that ties services together has some drawbacks. Continue Reading
Problem Solve Two-factor and multifactor authentication strategies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As passwords become targets of phishing attacks, password management has become increasingly difficult. Expert Nick Lewis explains how cryptographic keys could replace passwords. Continue Reading
SMS authentication is often used to secure telematics information, but it may not be strong enough. Expert Judith Myerson discusses why, and how to improve the protection of this data. Continue Reading
Users often dismiss Outlook certificate errors, but admins should know better. Here are some steps to address the three common causes of certificate errors. Continue Reading