Cloud MFA

Multi-factor authentication (also referred to as 2FA or 2 Factor Authentication) is one of the most important steps you can take to secure your identities. MFA is an added step…
The post Cloud MFA appeared first on JumpCloud.
The post Cloud MFA appea… Continue reading Cloud MFA

Cloud MFA

Multi-factor authentication (also referred to as 2FA or 2 Factor Authentication) is one of the most important steps you can take to secure your identities. MFA is an added step…
The post Cloud MFA appeared first on JumpCloud.
The post Cloud MFA appea… Continue reading Cloud MFA

3 Ways to Make Multi-Factor Authentication Easier for Everyone

The case for multi-factor authentication (MFA) is clear. The harder you make it for cyber attackers to get to your data, the lower your risk of a breach—and MFA definitely makes it harder, by requiring people who request access to authenticate their identity in more than one way. The downside is that if you don’t…

The post 3 Ways to Make Multi-Factor Authentication Easier for Everyone appeared first on Speaking of Security – The RSA Blog.

Continue reading 3 Ways to Make Multi-Factor Authentication Easier for Everyone

Ready, Set, Authenticate: Why You Need RSA SecurID® Access to Win the Race

There are times when trying to put together an effective authentication strategy feels like competing in track-and-field events. Business and IT are supposed to be on the same team, but far too often seem to be racing toward completely different goals. Sure, it’s important to get to the finish line fast, but not at the…

The post Ready, Set, Authenticate: Why You Need RSA SecurID® Access to Win the Race appeared first on Speaking of Security – The RSA Blog.

Continue reading Ready, Set, Authenticate: Why You Need RSA SecurID® Access to Win the Race

Six Keys to Successful Identity Assurance – Machine Learning

In our last discussion on the six keys to an identity assurance strategy, we talked about anomaly detection. In that blog, we discussed recognizing normal and abnormal behavior. Recognizing this behavior, and adapting to changes in that behavior, is where the topic of this blog starts as our next key component of an identity assurance…

The post Six Keys to Successful Identity Assurance – Machine Learning appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance – Machine Learning

Phishing 101 at the School of Hard Knocks

A recent, massive spike in sophisticated and successful phishing attacks is prompting many universities to speed up timetables for deploying mandatory two-factor authentication (2FA) — requiring a one-time code in addition to a password — for access to student and faculty services online. This is the story of one university that accelerated plans to require 2FA after witnessing nearly twice as many phishing victims in the first two-and-half months of this year than it saw in all of 2015. Continue reading Phishing 101 at the School of Hard Knocks

Phishing 101 at the School of Hard Knocks

A recent, massive spike in sophisticated and successful phishing attacks is prompting many universities to speed up timetables for deploying mandatory two-factor authentication (2FA) — requiring a one-time code in addition to a password — for access to student and faculty services online. This is the story of one university that accelerated plans to require 2FA after witnessing nearly twice as many phishing victims in the first two-and-half months of this year than it saw in all of 2015. Continue reading Phishing 101 at the School of Hard Knocks

Answering the #1 Question in Identity Management

Takeaways from a Recent Identity Survey by IDG It’s the infamous joke we’ve all used at one point or another – “Knock, knock. Who’s there?” When it comes to identity management, knowing the answer to this question is mission critical. Whether your employees, contractors, customers and partners are accessing your data, applications and systems in…

The post Answering the #1 Question in Identity Management appeared first on Speaking of Security – The RSA Blog.

Continue reading Answering the #1 Question in Identity Management