securityintelligence.com securityintelligence.com

How to Fix the Big Problems With Two-Factor and Multifactor Authentication

Getting a second opinion is a great idea in both medicine and end-user cybersecurity. Two-factor authentication (2FA) and multifactor authentication (MFA) are powerful tools in the fight against all kinds of cyberattacks that involve end-user devices and internet-based services. There’s just one big problem: it’s far, far too common for people to use text messaging as the second factor. That turns phone numbers into digital...

securityintelligence.com securityintelligence.com

Learning the Building Blocks for Your CIAM Framework Part 3: Manage

Imagine being able to manage hundreds of millions of IDs and process billions of logins and other transactions per day. That’s what you can achieve for your organization by using consumer identity and access management, or CIAM. At the same time, your users can manage their data themselves by having a CIAM system ready to handle their needs and demands.  Among the four building blocks of CIAM, the Manage element occurs after...

securityintelligence.com securityintelligence.com

Surge of New Digital Accounts During the Pandemic Leads to Lingering Security Side Effects

How many online accounts did you open during the pandemic? A new survey examines the impact of this digital surge on risk to consumers and businesses alike. The unexpected nature of a global pandemic that washed over the entire world left everyone scrambling to maintain their daily activities and work as best they could. With stay-at-home orders that lasted for months on end, most people resorted to consuming services and ordering...