Two-Factor authentication News
May 05, 2017
News roundup: Attackers exploit SS7 vulnerability and drain bank accounts. Plus, Trump signs government IT executive order, an Intel AMT flaw threatens millions and more.
March 02, 2017
Apple strives to make its devices more secure for the enterprise, but its latest effort leaves things completely up to users. Users of the Apple iOS 10.3 beta are receiving push notifications ...
February 16, 2017
Yubico founder and CEO Stina Ehrensvard spoke with SearchSecurity at RSAC 2017 about FIDO authentication and how Google uses it to secure logins and cut costs.
January 17, 2017
Researchers saw a Gmail phishing campaign in the wild using clever tricks to access accounts including a difficult 2FA bypass only possible in real time.
Two-Factor authentication Get Started
Bring yourself up to speed with our introductory content
Windows 10 combines the old and the new with security. Lock down a good grade in this quiz covering Windows security, including how to use two-factor authentication. Continue Reading
Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are. Continue Reading
As mobile biometrics technology becomes increasingly common, it is important for IT to know how to support this kind of authentication and the security vulnerabilities it may still bring. Continue Reading
Evaluate Two-Factor authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
As more companies tap into enterprise messaging services, certain security considerations arise. Encryption, for instance, is a core requirement for any service. Continue Reading
Windows 10 comes with a host of security features IT should know about, including Windows Information Protection. It also has some obvious blind spots admins must not overlook. Continue Reading
Now that NIST has deprecated the use of SMS 2FA, should nongovernment organizations follow suit? Expert Mike Chapple discusses the risks of SMS-based 2FA to enterprises. Continue Reading
Manage Two-Factor authentication
Learn to apply best practices and optimize your operations.
Microsoft merged Windows Hello and Microsoft Passport to create Windows Hello for Business, which allows for two-factor authentication and enables single sign-on. Continue Reading
In this webcast, CISO Demetrios Lazarikos answers questions about IoT cybersecurity strategies and best practices. Continue Reading
The balance between user experience and security in VDI shops is not easy to find. Single sign-on, two-factor authentication and user experience monitoring can help. Continue Reading
Problem Solve Two-Factor authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Universal second factor devices can be used to strengthen authentication on major websites such as Facebook. Expert Matthew Pascucci explains how U2F works. Continue Reading
Two-factor authentication systems require more than using codes sent through SMS and smart cards. Expert Michael Cobb explains how to properly and effectively implement 2FA. Continue Reading
Attackers use compromised credentials to infiltrate enterprises undetected and steal corporate data. Expert Nick Lewis offers the best ways to handle this threat. Continue Reading