2013 Verizon DBIR highlights authentication issues

Two-Factor and Multifactor Authentication Strategies

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Best practices: How to implement and maintain enterprise user roles

    Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. In this tip, Forrester Research Principal Analyst Andras Cser offers a step-b... 

  • Security token and smart card authentication

    Get advice on how to mitigate data theft from hackers with security token and smart card authentication technology, smart card readers and software. 

  • Enterprise single sign-on: Easing the authentication process

    Learn how enterprise single sign-on (SSO) can ease the authentication process and can be a solution to employee access issues. Implementation and single sign-on software are also discussed. 

  • PKI and digital certificates: Security, authentication and implementation

    Get more information about PKI and digital certificates, such as how to implement PKI, how to ensure security and available implementation. Also learn about digital certificates, signatures and achieving authentication through a certificate authority... 

  • The steps of privileged account management implementation

    Privileged accounts have always been difficult to secure, and they remain the focal point for the insider attack. Luckily, an emerging class of privileged account management products is here to help. Identity management pro Mark Diodati discusses the... 

  • Trends in enterprise identity and access management

    The market for identity and access management (IAM) products is growing rapidly to meet varied business and compliance demands. What trends -- good and bad -- are on the horizon? IAM expert Joel Dubin offers a guide to the products that are moving th... 

  • Understanding multifactor authentication features in IAM suites

    Enterprises often make the mistake of assuming that IAM suites come with tightly integrated multifactor authentication features, but in reality making sure they work together well can be a challenge. In this tip, IAM luminary Joel Dubin explains why ... 

  • Worst Practices: Three big identity and access management mistakes

    Simple IAM mistakes such as writing down passwords and unaudited user accounts can allow malicious access into corporate networks. In this tip, contributor Joel Dubin exposes the most common identity management and access control blunders, and enligh... 

  • Enterprise security in 2008: Assessing access management

    Access management troubles were hardly few and far between in 2007, and according to IAM expert Joel Dubin, access management challenges aren't going away in 2008. In this tip, Dubin outlines this year's key issues, including remote access, provisio... 

  • Identity-enabled network devices promise extra layer of authentication

    Why only authenticate users when organizations can authenticate devices as well? As Joel Dubin writes, the technology exists for enterprises to add a extra layer of security to their networks, but it remains to be seen whether an effort backing ident...