Two-Factor Authentication Requirements: The Basics
Two-factor authentication (2FA) is one of the most important authentication tools. Learn what it is, why it's essential, how it works, and how to get started.
The latest information security news - what's happening now, what's important, why it matters, real-world implications and who it matters to - without any of the overhype.
428 Articles Found
Two-factor authentication (2FA) is one of the most important authentication tools. Learn what it is, why it's essential, how it works, and how to get started.
It would be pretty cool if we had a framework available to us that validated a user’s identity, validated the machine they were using, and applied some policy and context for everything they tried to access. A model that would move the perimeter to anywhere an access decision is made. Oh, wait, we do. It’s often referred to as zero trust.
The Department of Homeland Security (DHS) made a curious announcement during the shutdown that had everyone scratching their collective heads ... at first. DHS gave agencies 10 days to get their account security in order, specifically calling out two-factor authentication (2FA) and other protections due to DNS hijacking vulnerabilities.
The latest evolution in phishing is the Modlishka tool, which provides the attacker a simple tool to use a reverse proxy to place the attacker between the user and the target site. The user’s traffic passes through the tool and can capture SMS-based 2FA tokens. Here, we look at how to counter modern phishing attacks with strong 2FA and a defense in depth strategy.
The new Guide to Web Authentication aims to provide a useful developer resource for engaging with WebAuthn to replace or supplement password-based authentication on your own websites.