Eddi Freiterblog.freiter.com·Dec 8, 2024Simple and cost-effective MFA deployment with TOTPWritten by Eddi Freiter in collaboration with Will Neumann Organizations of all sizes are increasingly using productivity tools and applications hosted in the cloud. However, providing secure access to user information and sensitive data remains a si...MFA
Shivain Sharmashivain.hashnode.dev·Nov 3, 2024Key Strategies for Digital Privacy: A Guide to Zero Trust ArchitectureEver wondered how companies are locking down sensitive data and keeping hackers at bay in today’s digital age? That’s where Zero Trust Architecture (ZTA) comes in—a revolutionary approach that’s reshaping how organizations protect their networks. Ins...3 likesdigital privacy
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 10, 2024Day 11: Explore Multi-Factor Authentication (MFA)It's day 11, of #CybersecurityAwarenessMonth, we're just in the middle of the party, so let's enjoy #MFA-a simple but powerful way to safeguard your online presence. via GIPHY “Probably your first security feature at your home, is your locks at the d...Cybersecurity Awareness 2024: Securing Our Worldmfa setup guide
Chaithrachai005.hashnode.dev·Sep 26, 2024Multi-Factor Authentication: A Key to Digital SecurityVoice Biometrics: A Game Changer Voice biometrics technology analyzes the unique characteristics of an individual’s voice, including pitch, tone, and speech patterns, to create a digital voiceprint. This voiceprint serves as a secure identifier, allo...voice biometrics
Maxwell Antwi Bosiakocybermonday.hashnode.dev·Aug 26, 2024Beyond Passwords: How MFA Protects Your Digital Life.In an era where cybercriminals have amassed over 15 billion stolen credentials, safeguarding your digital accounts has never been more crucial. Multi-factor authentication (MFA) is a vital security measure designed to enhance the protection of your s...Multi Factor Authentication
Keith CaseyforPangea Blogpangea.cloud·May 13, 2024Do Passkeys Solve the Deployability Issue?I’ve lost count of how many RSA Tokens, Yubikeys, and the like I’ve collected, lost, misplaced, replaced, and cursed over the years. While they’re exceptionally secure, they’re a pain for both administrators to deploy and users to keep track of. Eith...711 readsauthentication
SuperTokenssupertokens.hashnode.dev·Jan 19, 2024The Multifaceted Benefits of Multi-Factor AuthenticationIn 2022, over 80% of data breaches were attributed to compromised passwords. Although email-password based authentication has become the de facto method for authentication, it is very vulnerable to attacks. Through phishing, keylogging or simple brut...FIDO
Scott Spendolinispendolini.blog·Jul 4, 2023IDCS Multi-Factor AuthenticationPhoto by NordWood Themes on Unsplash Now that we have APEX delegating authentication and authorization services to IDCS, let's add another layer of security: multi-factor authentication. Multi-factor authentication - or MFA for short - provides an ad...12 likes·281 readsWho Are You?MFA
PopLab AgencyforAD Attacksad-attacks.hashnode.dev·May 28, 2023Multi-Factor Authentication (MFA) Bypass Techniques: A Comprehensive GuideIn this article, we delve into the world of Multi-Factor Authentication (MFA) bypass techniques, shedding light on the vulnerabilities and methods employed by attackers. Learn how to strengthen your security measures and protect your sensitive inform...authentication
Vishwas Acharyavishwasacharya.hashnode.dev·May 15, 2023AWS Security: Best Practices for Protecting Your DataIn recent years, cloud computing has become increasingly popular among businesses of all sizes. Amazon Web Services (AWS) is a leading provider of cloud-based services, offering numerous benefits such as flexibility, scalability, and cost-effectivene...51 readsaws security