Two-factor and multifactor authentication strategies

User names and passwords are no longer enough and more enterprises are deploying two-factor or multifactor authentication products. Browse the articles and advice in this section for the latest information on using strong authentication in your organization.

Two-factor and multifactor authentication strategies News

  • October 09, 2018 09 Oct'18

    U.S. government domain officials to start using 2FA

    The government domain registrar -- DotGov -- began rolling out two-factor authentication for officials managing .gov domains in order to mitigate against DNS hijacking.

  • October 08, 2018 08 Oct'18

    Risk & Repeat: Inside the Facebook 2FA fail

    This week's Risk & Repeat podcast discusses the latest controversy for Facebook, which has been using two-factor authentication numbers for advertising purposes.

  • August 03, 2018 03 Aug'18

    Reddit breach sparks debate over SMS 2FA

    Using two-factor authentication with one-time passwords sent via SMS has come under question again after a Reddit breach was blamed on the faulty 2FA method.

  • July 24, 2018 24 Jul'18

    Physical security keys eliminate phishing at Google

    Successful phishing attempts have been eliminated among Google employees following a requirement to use physical security keys in order to gain access to all Google accounts.

View All News

Two-factor and multifactor authentication strategies Get Started

Bring yourself up to speed with our introductory content

  • smart card

    A smart card is a physical card that has an embedded integrated chip that acts as a security token. Continue Reading

  • one-time password (OTP)

    A one-time password (OTP) is an automatically generated numeric or alphanumeric string of characters that authenticates the user for a single transaction or login session. Continue Reading

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security process in which the user provides two different authentication factors to verify themselves to better protect both the ... Continue Reading

View All Get Started

Evaluate Two-factor and multifactor authentication strategies Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Two-factor and multifactor authentication strategies

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Two-factor and multifactor authentication strategies Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close