Two-Factor authentication News
May 05, 2017
News roundup: Attackers exploit SS7 vulnerability and drain bank accounts. Plus, Trump signs government IT executive order, an Intel AMT flaw threatens millions and more.
March 02, 2017
Apple strives to make its devices more secure for the enterprise, but its latest effort leaves things completely up to users. Users of the Apple iOS 10.3 beta are receiving push notifications ...
February 16, 2017
Yubico founder and CEO Stina Ehrensvard spoke with SearchSecurity at RSAC 2017 about FIDO authentication and how Google uses it to secure logins and cut costs.
January 17, 2017
Researchers saw a Gmail phishing campaign in the wild using clever tricks to access accounts including a difficult 2FA bypass only possible in real time.
Two-Factor authentication Get Started
Bring yourself up to speed with our introductory content
Biometric authentication methods, like voice, fingerprint and facial recognition systems, may be the best replacement for passwords in user identity and access management. Continue Reading
The old username/password combination is not the safest form of ID management. See why two-factor authentication belongs in IT's mobile security arsenal and learn how to set it up. Continue Reading
Windows 10 combines the old and the new with security. Lock down a good grade in this quiz covering Windows security, including how to use two-factor authentication. Continue Reading
Evaluate Two-Factor authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Jason Hong talks about Carnegie Mellon's work in social cybersecurity, a new discipline that uses techniques from social psychology to improve our ability to be secure online. Continue Reading
The Microsoft Authenticator application enables smartphone-based, two-factor authentication and attempts to reduce the use of passwords. Expert Matthew Pascucci explains how. Continue Reading
Facebook's Delegated Recovery aims to replace knowledge-based authentication with third-party account verification. Expert Michael Cobb explains how this protocol works. Continue Reading
Manage Two-Factor authentication
Learn to apply best practices and optimize your operations.
A healthcare security expert describes the common and emerging tactics attackers use during healthcare security breaches and what to do to protect against them. Continue Reading
Microsoft merged Windows Hello and Microsoft Passport to create Windows Hello for Business, which allows for two-factor authentication and enables single sign-on. Continue Reading
In this webcast, CISO Demetrios Lazarikos answers questions about IoT cybersecurity strategies and best practices. Continue Reading
Problem Solve Two-Factor authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Universal second factor devices can be used to strengthen authentication on major websites such as Facebook. Expert Matthew Pascucci explains how U2F works. Continue Reading
Two-factor authentication systems require more than using codes sent through SMS and smart cards. Expert Michael Cobb explains how to properly and effectively implement 2FA. Continue Reading
Attackers use compromised credentials to infiltrate enterprises undetected and steal corporate data. Expert Nick Lewis offers the best ways to handle this threat. Continue Reading