Two-Factor authentication News
September 01, 2016
Confirming that 68 million Dropbox passwords were exposed in 2012, the cloud provider continued to urge users to update their credentials and enable two-factor authentication.
August 30, 2016
Cloud storage provider warns longtime users that it's time to change Dropbox passwords, as a precaution, after discovering an old set of Dropbox credentials was exposed -- in 2012.
July 26, 2016
America's National Institute for Standards and Technology is advising the deprecation of using SMS-based two-factor authentication in order to improve security.
January 19, 2016
A new proof-of-concept attack presented at ShmooCon 2016 exploits security weaknesses in cloud-based password manager LastPass and could allow attackers to gain control of users' accounts.
Two-Factor authentication Get Started
Bring yourself up to speed with our introductory content
"They are who we thought they were." That’s what former Arizona Cardinals head coach Dennis Green shouted nonsensically at reporters during one of the most epic press conference meltdowns in ... Continue Reading
Docker's recent upgrade introduced support for hardware signing and in the future, automated security analysis on Docker images. Expert Dan Sullivan goes over these new features. Continue Reading
Content security policies that are too restrictive are destined to fail. These surefire tips will help you secure documents without impeding productivity. Continue Reading
Evaluate Two-Factor authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Traditional passwords simply aren't good enough for VDI shops. Instead they need to make users' devices require a second form of authentication or use one-time passwords that change frequently. Continue Reading
Biometric security systems come with many advantages, but do they also come with many regulations? Expert Mike Chapple discusses biometric authentication compliance. Continue Reading
We often hear about the importance of the API economy, but are today's businesses prepared for the transition to this new paradigm? Sassan Saedi of Nexmo offers his take in this Q&A. Continue Reading
Manage Two-Factor authentication
Learn to apply best practices and optimize your operations.
Two-factor authentication may not be perfect, but nothing is with security, and it is certainly more secure than any single-form factor method, including biometrics. Continue Reading
IT admins need identity management tools to ensure network users are who they say they are. This applies to mobile users on an enterprise WLAN and the wired network itself. Continue Reading
In this Q&A, the former CIO of Community Health Systems discusses how to prevent healthcare cyberattacks and lessons learned during his career. Continue Reading
Problem Solve Two-Factor authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Attackers use compromised credentials to infiltrate enterprises undetected and steal corporate data. Expert Nick Lewis offers the best ways to handle this threat. Continue Reading
Banking malware Vawtrak has the capability to bypass two-factor authentication. Expert Nick Lewis explains how Vawtrak works and how to stop it. Continue Reading
The iBanking malware has evolved to target Android devices. Enterprise threats expert Nick Lewis offers pointers on how to detect this malware on Android as well as prevent the threat. Continue Reading