I came across an article last week that indicated there was a successful attack on Microsoft’s Office 365 and Google’s G Suite environments that was able to bypass multi-factor authentication (MFA).
Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She provides cybersecurity publication consulting services to organizations and was formerly a senior computer scientist for the ...
A comprehensive developer guide to implementing secure authentication in modern applications. Covers OAuth 2.0, OIDC, ...
Compare the top 5 multi-factor authentication software in 2026. Find the best customer MFA solution for your apps with our detailed platform review.
On October 4, 2023, the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) published Identity and Access Management: Developer and Vendor Challenges, an ...
The MFA Gap Calculator is built for SMBs as well as insurance and compliance agents to be able to quickly identify and address gaps in MFA implementation. The MFA Gap Calculator is a welcome evolution ...
Why do we need a new approach to authentication? Bypassing existing MFA techniques to garner employee credentials or to take over employee accounts has become child's play for attackers. There are ...
Multi-Factor Authentication (MFA) has become a cornerstone of access security, offering an extra layer of defense against cyber threats. However, despite its effectiveness, MFA is not impervious to ...
Tyler Derickson is the cybersecurity and systems administrator for Arbor Park School District 145 in Oak Forest, Ill. At just 20 years old, he applies his dedication and passion for cybersecurity to ...
Multifactor authentication (MFA) is often hailed as a silver bullet in cybersecurity. Microsoft once claimed that MFA could block 99.9% of account compromise attacks. Yet, attackers have repeatedly ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results