Two-Factor and Multifactor Authentication Strategies News
July 26, 2016
America's National Institute for Standards and Technology is advising the deprecation of using SMS-based two-factor authentication in order to improve security.
August 14, 2015
Dropbox announced it is strengthening login options with support for universal 2nd factor (U2F) security keys with the aim of making two-step verification faster and easier.
August 04, 2015
Identity and access management deployments are notoriously complex. And things are getting worse as legacy technology meets next-generation applications. As the traditional network perimeter continues to disappear, robust IAM becomes more important ...
June 05, 2015
News roundup: New settings and options to boost user privacy and security are emerging on major websites, but is it enough?
Two-Factor and Multifactor Authentication Strategies Get Started
Bring yourself up to speed with our introductory content
Kerberos is the authentication protocol used by most operating systems. Each time a Windows client logs into a corporate network, Kerberos is being used to authenticate access. Continue Reading
Single sign-on is a session and user authentication process in which a user can access multiple applications with one name and password. Continue Reading
Revise your enterprise's IAM strategy for better integration with emerging technologies, such as cloud services and software-defined everything. Expert Johna Till Johnson explains. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Two-Factor and Multifactor Authentication Strategies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The Mazar malware can wipe an entire Android device once it has been installed. Expert Nick Lewis explains how this malware works, and how attacks can be prevented. Continue Reading
Microsoft's Kerberos protocol implementation has long-standing issues with its secret keys. Expert Michael Cobb explains how to mitigate the authentication vulnerabilities. Continue Reading
The terms two-step verification and two-factor authentication are used interchangeably, but do they differ from one another? Expert Michael Cobb explains. Continue Reading
Manage Two-Factor and Multifactor Authentication Strategies
Learn to apply best practices and optimize your operations.
Not sure who's really behind that username and password? Google, Facebook and others may finally give multifactor authentication technology the 'push' it needs. Continue Reading
This Beyond the Page informs InfoSec pros of the security concerns related to third-party vendor access, and how an enterprise IAM strategy can help. Continue Reading
In this video, Michael Cobb discusses how to control third parties with enterprise IAM before it's too late. Continue Reading
Problem Solve Two-Factor and Multifactor Authentication Strategies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Microsoft is banning weak passwords on many of its services with the Smart Password Lockout feature. Expert Michael Cobb explains how it works, and if it will be beneficial. Continue Reading
Banking malware Vawtrak has the capability to bypass two-factor authentication. Expert Nick Lewis explains how Vawtrak works and how to stop it. Continue Reading
FIDO-ready tech could take a while, but there are a variety of multifactor authentication methods available now to make your logins secure. Continue Reading