- Microsoft warned 10,000 targets of nation-state hackers in one year
- Microsoft eyes Mozilla’s Rust to obliterate C++ memory security flaws
- Will Facebook’s $US5b punishment finally prompt other companies to act on privacy?
- As skills gaps persist, CEDA finds temporary migration is “a net positive” for Australia
- The week in security: After major GDPR violations, everything is fine
Beyond the Password
This paper explores how enterprises can move beyond the password (something the user ‘knows’) to an intelligent authentication process that eliminates the risk of weak and vulnerable passwords. It works by cross-validating with other authentication methods like a physical item such as a token or smartphone (something the user ‘has’) and/or a personal attribute like a fingerprint or retina scan (something the user ‘is’). Two-factor (2FA) authentication and multifactor authentication (MFA) are now possible with intelligent authentication across corporate software, Cloud services and smart device apps.