Passwords have become an insecure and cumbersome form of authentication. Learn about risk-based multifactor authentication, an approach to access management that uses context to determine risk.
Organizations that sleep on third-party risk management could unknowingly expose their systems to remote attacks, access risks and more.
To reduce the risk of a breach due to weak or stolen passwords, companies are adopting multifactor authentication, which requires users to submit an extra piece of data in addition to their password.
Smartphones running Android 7.0 and higher can now serve as two-factor authentication (2FA) tools as part of a Google 2FA strategy to boost security across its online services.
Spring is just around the corner, which means it's time for CISOs to evaluate their security strategy, eliminate processes that aren't working, and adopt new cybersecurity practices and technologies.
A recent phishing campaign used a fake Google reCAPTCHA as part of its efforts to target Polish bank employees with malware.
Researchers discovered Geodo botnets using a new spam campaign to deliver samples of Qakbot malware.
When framed as an innovative, even "cool" feature, multifactor authentication can deliver the security online retail customers demand without diminishing the user experience.
A new reverse proxy tool called Modlishka can easily automate phishing attacks and bypass two-factor authentication (2FA) — and it's available for download on GitHub.
Splash Data released its list of the worst passwords of 2018. How does your enterprise stack up, and what advice can you give users to help improve their password security hygiene in the new year?