Two-Factor and Multifactor Authentication Strategies

Two-Factor and Multifactor Authentication Strategies News

  • January 17, 2017 17 Jan'17

    Gmail phishing campaign uses real-time techniques to bypass 2FA

    Researchers saw a Gmail phishing campaign in the wild using clever tricks to access accounts including a difficult 2FA bypass only possible in real time.

  • July 26, 2016 26 Jul'16

    Experts say NIST deprecating SMS 2FA is long overdue

    America's National Institute for Standards and Technology is advising the deprecation of using SMS-based two-factor authentication in order to improve security.

  • August 14, 2015 14 Aug'15

    Dropbox adds support for U2F security keys

    Dropbox announced it is strengthening login options with support for universal 2nd factor (U2F) security keys with the aim of making two-step verification faster and easier.

  • August 04, 2015 04 Aug'15

    Is third-party vendor management the next IAM frontier?

    Identity and access management deployments are notoriously complex. And things are getting worse as legacy technology meets next-generation applications. As the traditional network perimeter continues to disappear, robust IAM becomes more important ...

View All News

Two-Factor and Multifactor Authentication Strategies Get Started

Bring yourself up to speed with our introductory content

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are. Continue Reading

  • Kerberos

    Kerberos is the authentication protocol used by most operating systems. Each time a Windows client logs into a corporate network, Kerberos is being used to authenticate access. Continue Reading

  • single sign-on (SSO)

    Single sign-on is a session and user authentication process in which a user can access multiple applications with one name and password. Continue Reading

View All Get Started

Evaluate Two-Factor and Multifactor Authentication Strategies Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Two-Factor and Multifactor Authentication Strategies

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Two-Factor and Multifactor Authentication Strategies Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close