New & Notable
Two-factor and multifactor authentication strategies News
August 03, 2018
Using two-factor authentication with one-time passwords sent via SMS has come under question again after a Reddit breach was blamed on the faulty 2FA method.
July 24, 2018
Successful phishing attempts have been eliminated among Google employees following a requirement to use physical security keys in order to gain access to all Google accounts.
June 28, 2018
At Identiverse 2018, speakers and attendees expect a rise in two-factor authentication, as the single sign-on user password authentication falls out of favor.
May 29, 2018
AI and as-a-service platforms enable IT to take a more hands-off approach. But with adoption in the early stages, most IT pros wonder what the future holds for identity management.
Two-factor and multifactor authentication strategies Get Started
Bring yourself up to speed with our introductory content
Recent advances in IAM policy, strategy and technology are raising companies' ability authenticate identities and manage access to their systems and data. Continue Reading
Federated identity management (FIM) is an arrangement that can be made between multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all the enterprises in the group. Continue Reading
Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be. Continue Reading
Evaluate Two-factor and multifactor authentication strategies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Researchers bypassed Apple's facial recognition authentication program, Face ID, in under a week. Expert Michael Cobb explains why it's not a major cause for concern for users. Continue Reading
Google added a layer to its account security system with Advanced Protection Program. Matt Pascucci explains how individuals can better defend themselves from malicious actors. Continue Reading
Bringing new application types and integration points into the enterprise, cloud can complicate user identity management. So, how can you be sure your data is secure? Continue Reading
Manage Two-factor and multifactor authentication strategies
Learn to apply best practices and optimize your operations.
Zero-trust networks are often deemed compromised and untrusted, making authentication variables essential to security. Expert Matthew Pascucci explains a zero-trust security model. Continue Reading
Access to the accounts of privileged users top most hackers' wish lists. Expert Michael Cobb reviews how hackers target these accounts and outlines ways to keep them locked tight. Continue Reading
Passwords and tokens are a thing of the past. No way, you say? Our webcast on the likely ways authentication will work in the future may make a believer out of you. Continue Reading
Problem Solve Two-factor and multifactor authentication strategies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As passwords become targets of phishing attacks, password management has become increasingly difficult. Expert Nick Lewis explains how cryptographic keys could replace passwords. Continue Reading
SMS authentication is often used to secure telematics information, but it may not be strong enough. Expert Judith Myerson discusses why, and how to improve the protection of this data. Continue Reading
Users often dismiss Outlook certificate errors, but admins should know better. Here are some steps to address the three common causes of certificate errors. Continue Reading