Two-Factor authentication News
August 14, 2015
Dropbox announced it is strengthening login options with support for universal 2nd factor (U2F) security keys with the aim of making two-step verification faster and easier.
June 30, 2015
A report reveals that many stolen US government agency passwords traveled across the Web, including credentials from OPM, which was recently breached due to stolen passwords.
April 22, 2015
At RSA Conference 2015 security officials from Microsoft, Google and more discussed cloud security and privacy improvements and top threats today.
September 17, 2014
Following a high-profile leak of celebrity photos, Apple has moved to improve its iCloud two-factor authentication mechanisms.
Two-Factor authentication Get Started
Bring yourself up to speed with our introductory content
Which authentication method is better for securing enterprise devices and systems: two-factor authentication or multifactor authentication? Continue Reading
Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code. Continue Reading
SSH security can be threatened by many kinds of attacks, but there are also several steps enterprises can take to protect against them. Expert Dejan Lukan explains. Continue Reading
Evaluate Two-Factor authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Cloud credentials can create major vulnerabilities. Expert Dan Sullivan outlines how to detect compromised credentials and the best ways to prevent it. Continue Reading
Simple photography cracking biometric systems highlights the need for two-factor authentication in enterprises according to expert Randall Gamby. Continue Reading
Multifactor authentication is a login security method that's picking up momentum in the business world, but IT shouldn't overlook its blemishes. Continue Reading
Manage Two-Factor authentication
Learn to apply best practices and optimize your operations.
Learn how ChatOps chat tools help software developers improve workflow, increase transparency and improve documentation. Continue Reading
Security managers increasingly combine existing tools to implement an overall BYOD security posture. Key security features can make the job easier. Continue Reading
The iBanking malware has evolved to target Android devices. Enterprise threats expert Nick Lewis offers pointers on how to detect this malware on Android as well as prevent the threat. Continue Reading
Problem Solve Two-Factor authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Enterprise social media has revolutionized how businesses communicate with consumers. However, it has also made brand hacking an even larger concern. Continue Reading
Cloud-based application security is becoming an increasingly prevalent concern. Uncover three key best practices for preventing security breaches. Continue Reading
Kevin Beaver discusses the strengths and weaknesses of passwords and two-factor authentication in mobile access management. Continue Reading