I came across an article last week that indicated there was a successful attack on Microsoft’s Office 365 and Google’s G Suite environments that was able to bypass multi-factor authentication (MFA).
Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She provides cybersecurity publication consulting services to organizations and was formerly a senior computer scientist for the ...
On October 4, 2023, the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) published Identity and Access Management: Developer and Vendor Challenges, an ...
But when you ask a simple question like “MFA vs SSO: what should you use?” — the answer is more complex than it appears. This represents the core issue. Today, identity is the primary attack vector.
Worldwide, just 46% of small and medium-sized enterprises (SMEs) have implemented recommended multifactor authentication (MFA) technology, and only 13% mandate its use for employee account or ...
The MFA Gap Calculator is built for SMBs as well as insurance and compliance agents to be able to quickly identify and address gaps in MFA implementation. The MFA Gap Calculator is a welcome evolution ...
On 27 April, the government backed security certification scheme, Cyber Essentials v3.3, takes effect and multi-factor ...
Many see multi-factor authentication (MFA) as one of – if not the – most crucial security defenses in existence. Deploying MFA means you require more than one authentication factor to identify a user, ...