New & Notable
Two-factor and multifactor authentication strategies News
March 25, 2020
Zero-trust architecture has spread across the enterprise security software market, so IT pros should understand the latest advancements in zero-trust authentication.
February 18, 2020
With RSA Conference just around the corner, Dell announced it has agreed to sell RSA to private equity firm Symphony Technology Group for approximately $2 billion.
October 09, 2019
Twitter used two-factor authentication information, including email addresses and phone numbers, to target ads for an unknown number of people over an unknown period of time.
July 01, 2019
At a recent security and identity conference, attendees discussed the IAM market in clear terms: Shiny new features might be cool, but practicality reigns.
Two-factor and multifactor authentication strategies Get Started
Bring yourself up to speed with our introductory content
Cybersecurity fraud's roots run deep, with fraudsters forever after the same thing: tricking others out of their valuable assets. Learn how to keep defenses high. Continue Reading
Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves. Continue Reading
Andrew Froehlich breaks down how authentication and digital identity differ and how each of them are intrinsic to identity and access management. Continue Reading
Evaluate Two-factor and multifactor authentication strategies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Make 2020 the year your company keep its resolution to avoid a data breach. Experts offer lessons learned from the top 2019 data breaches to help stay secure in the year ahead. Continue Reading
A complex password only goes so far to stop a breach. Implementing multifactor authorization can help, but make sure the product you select fits your current and future needs. Continue Reading
Identity and access management is a critical piece of enterprise information security. But the benefits of IAM go beyond illuminating who -- and what -- might be using your network. Continue Reading
Manage Two-factor and multifactor authentication strategies
Learn to apply best practices and optimize your operations.
When it comes to minimum password length, 14-character passwords are generally considered secure, but they may not be enough to keep your enterprise safe. Continue Reading
A Reddit breach was triggered by threat actors intercepting SMS messages used to authenticate employees to access sensitive data. Learn why enterprises should reconsider SMS for 2FA. Continue Reading
Zero-trust networks are often deemed compromised and untrusted, making authentication variables essential to security. Expert Matthew Pascucci explains a zero-trust security model. Continue Reading
Problem Solve Two-factor and multifactor authentication strategies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Being part of island-hopping is no day at the beach when it comes to cyberattacks. Learn how to avoid being either a victim or an attacker's unwitting accomplice. Continue Reading
Why is BEC such a popular attack? Because it works, unfortunately, tempting hackers with huge potential payouts. Learn how to keep them from lining their pockets with your assets. Continue Reading
Are you up to date on the most popular digital authentication methods and their potential cybersecurity risks? Learn how the right technology can improve and secure access management. Continue Reading