Two-Factor authentication News
November 22, 2016
Minutes count in legal work, and Graubard Miller needed a simpler platform for disaster recovery. The verdict: The law firm chose iland disaster recovery in the cloud.
September 01, 2016
Confirming that 68 million Dropbox passwords were exposed in 2012, the cloud provider continued to urge users to update their credentials and enable two-factor authentication.
August 30, 2016
Cloud storage provider warns longtime users that it's time to change Dropbox passwords, as a precaution, after discovering an old set of Dropbox credentials was exposed -- in 2012.
July 26, 2016
America's National Institute for Standards and Technology is advising the deprecation of using SMS-based two-factor authentication in order to improve security.
Two-Factor authentication Get Started
Bring yourself up to speed with our introductory content
"They are who we thought they were." That’s what former Arizona Cardinals head coach Dennis Green shouted nonsensically at reporters during one of the most epic press conference meltdowns in ... Continue Reading
Docker's recent upgrade introduced support for hardware signing and in the future, automated security analysis on Docker images. Expert Dan Sullivan goes over these new features. Continue Reading
Content security policies that are too restrictive are destined to fail. These surefire tips will help you secure documents without impeding productivity. Continue Reading
Evaluate Two-Factor authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Now that NIST has deprecated the use of SMS 2FA, should nongovernment organizations follow suit? Expert Mike Chapple discusses the risks of SMS-based 2FA to enterprises. Continue Reading
Traditional passwords simply aren't good enough for VDI shops. Instead they need to make users' devices require a second form of authentication or use one-time passwords that change frequently. Continue Reading
Biometric security systems come with many advantages, but do they also come with many regulations? Expert Mike Chapple discusses biometric authentication compliance. Continue Reading
Manage Two-Factor authentication
Learn to apply best practices and optimize your operations.
Securing and managing VPNs can be a challenge, and public key infrastructure can help, but PKI problems are often lurking. Continue Reading
Two-factor authentication may not be perfect, but nothing is with security, and it is certainly more secure than any single-form factor method, including biometrics. Continue Reading
IT admins need identity management tools to ensure network users are who they say they are. This applies to mobile users on an enterprise WLAN and the wired network itself. Continue Reading
Problem Solve Two-Factor authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Attackers use compromised credentials to infiltrate enterprises undetected and steal corporate data. Expert Nick Lewis offers the best ways to handle this threat. Continue Reading
In this Q&A, the former CIO of Community Health Systems discusses how to prevent healthcare cyberattacks and lessons learned during his career. Continue Reading
Banking malware Vawtrak has the capability to bypass two-factor authentication. Expert Nick Lewis explains how Vawtrak works and how to stop it. Continue Reading