Anshumanhashnode.ssh-i.in·Oct 20, 2024How to Secure SSH on Any Linux Server using PAM and Google AuthenticatorBy default, SSH relies on passwords for authentication, though most security guidelines recommend switching to SSH keys for stronger protection. However, despite being more secure, SSH keys still represent only a single factor of authentication. The ...DiscussLinux
Sumit Kushwahapplying-mfa-in-azure-cloud.hashnode.dev·Sep 22, 2024Applying Multi-Factor Authentication (MFA) in Azure CloudMulti-Factor Authentication (MFA) adds an extra layer of security to your Azure resources by requiring users to provide two or more forms of verification. This can significantly reduce the risk of unauthorized access. Prerequisites for Applying MFA i...DiscussAzure Cloud
Maxwell Antwi Bosiakocybermonday.hashnode.dev·Aug 26, 2024Beyond Passwords: How MFA Protects Your Digital Life.In an era where cybercriminals have amassed over 15 billion stolen credentials, safeguarding your digital accounts has never been more crucial. Multi-factor authentication (MFA) is a vital security measure designed to enhance the protection of your s...DiscussMulti Factor Authentication
Chaithrachai005.hashnode.dev·Aug 26, 2024"The Ultimate MFA Implementation Guide: Enhancing Security with MFA in a Zero Trust NetworkMulti-Factor Authentication (MFA): Adding Layers of Security While passwordless authentication offers a substantial improvement over traditional methods, combining it with MFA further strengthens security. MFA requires users to provide two or more ve...DiscussMFA
Eazealliance eazealliance.hashnode.dev·Aug 17, 2024The Future of Multi-Factor Authentication (MFA): Insights from EazeAllianceAs digital security threats become increasingly sophisticated, the traditional methods of safeguarding sensitive information and systems are being reevaluated. Multi-Factor Authentication (MFA) has emerged as a critical defense mechanism, enhancing s...Discusstechnology
RivanorthProblog.rivanorth.com·Jul 8, 2024Responding to the Twilio Authy HackEarly July 2024, Twilio has disclosed that hackers took advantage of an unauthenticated endpoint in Authy's API to enumerate data associated with Authy accounts, including phone numbers. Following the compromise of Twilio's Authy multi factor authent...DiscussSecurity AdvisorySecurity
Haiman Sherhaimanshercloud.hashnode.dev·Jul 3, 2024Security Enhancement Tips: AWS IAM and MFA ExplainedIn the fast-paced world of cloud computing, ensuring robust security and efficient access management is paramount. AWS Identity and Access Management (IAM) and Multi-Factor Authentication (MFA) provide essential tools to meet these needs. Here’s a de...DiscussAWS
Caroline Johnsoncarolinejohnsoncj.hashnode.dev·Jun 28, 2024Secure and Simple: The Future of Authentication with Push Notification MFAIntroduction In the ever-evolving digital landscape, ensuring secure and seamless customer authentication is paramount. Traditional password-based authentication has long been the standard but comes with significant security risks. Weak passwords, re...DiscussMFA
Baruch MettlerforPangea Blogpangea.cloud·Jun 17, 2024Find Exposed Users with Credential Leak MonitoringBusinesses face a growing number of security threats, however, despite wide rollout of multi-factor authentication (MFA) and a wide compliance level focus on password policies, credential compromise remains a significant threat. Monitoring for creden...Discuss·499 readsMFA
Henri Cookblog.henricook.com·Jun 16, 2024Finally Getting Away from Authy for 2FAAs an experienced Software Engineer, keeping my systems secure is crucial. However, when the tools I rely on stop meeting my needs, it’s time for a change. Recently, I faced this dilemma with Authy. Authy, a popular two-factor authentication (2FA) ap...Discuss·209 readsauthentication