Visibility, Control, and Modern SSO: Elevating IAM Hygiene
During his session on “Guidance for Achieving IAM Resilience in a Cloud-First World” at the Gartner IAM Summit 2024, Michael Kelley introduced a concept that I…
During his session on “Guidance for Achieving IAM Resilience in a Cloud-First World” at the Gartner IAM Summit 2024, Michael Kelley introduced a concept that I…
Introduction Two-factor authentication (2FA) has long been hailed as one of the most effective ways to safeguard online accounts against unauthorized access. However, despite its strength,…
Multi-Factor Authentication (MFA) is widely recognized for enhancing security by requiring at least two forms of verification: usually something you know (like a password) and something…
Unveiling the Limitations of MFA As was demonstrated in the previous blog post, MFA cannot stand alone. MFA, on its own, still leaves enterprise systems vulnerable…
As part of our 3-part series on MFA weaknesses, this initial post will delve into the Adversary in the Middle attacks, how they circumvent MFA, and…