Multi-Factor Authentication
Phishing Just Got More Complicated
Last month, the FBI released a note warning businessesthat hackers are bypassing two-factor authentication. Two-factor authentication is usually seen as extra secure because it not only requires your username and passcode but ...
FBI Warns of Criminals Using Social Engineering, Technical Attacks to Bypass Multi-Factor Authentication
FBI’s Cyber Division issued a Private Industry Notification (PIN) warning businesses and other organizations that criminals are using a variety of hacking attacks and social engineering to bypass multi-factor authentication. “FBI reporting ...
Twitter Used Private Security Information to Better Target Ads
Twitter used people’s private information to help third-party advertisers target the right users by mistake, the company said in an announcement. The social media firm claims that it stopped this practice, but ...
Using Multi-Factor Authentication for Network Security
Many inquiries that we receive reference Multi-Factor Authentication (MFA) and how it can be used to improve the network security. MFA is a process that requires more than one form of identity ...
Protecting Infrastructure With TLS Client Authentication
Here at Threat Stack we really like Yubikeys — and they’re a critical part of our security program. Many folks know Yubikeys for their ability to generate one-time codes for use as ...
RSA and NIST Agree ? MFA a Critical Technology to Secure eCommerce
As eCommerce fraud continues to grow in an omnichannel world, how can businesses keep pace with focused fraud attempts? MFA has proven resilient and effective against eCommerce fraud. NIST recently worked with ...
Empowering Employees to Reduce Security Incidents
In the hustle and bustle of our modern world, we can all get easily lost in the noise. One kind of noise is most frustrating for security teams: the noise of security ...
What Is Two-Factor or Multi-Factor Authentication?
Traditional password-and-username authentication can leave users vulnerable. In 2010 Christopher Chaney, a celebrity obsessed cyber-stalker, got hold of a number of celebrity emails. Using data gleaned from social media and Wikipedia, he ...
Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers
It might be difficult to fathom how this isn't already mandatory, but Microsoft Corp. says it will soon force all Cloud Solution Providers (CSPs) that help companies manage their Microsoft Azure and ...
Ping + Preempt: Securing All Access In Hybrid Cloud Environments
Enterprises struggle to understand what is truly going on in their organization: what their users are doing and how to stop risky activity. Add in the complexity of a hybrid cloud environment, ...
