The Future is Loading
All
Visibility, Control, and Modern SSO: Elevating IAM Hygiene
4 min

Visibility, Control, and Modern SSO: Elevating IAM Hygiene

During his session on “Guidance for Achieving IAM Resilience in a Cloud-First World” at the Gartner IAM Summit 2024, Michael Kelley introduced a concept that I…

Bypassing 2FA with AiTM: How UNIXi Stops Credential Theft
7 min

Bypassing 2FA with AiTM: How UNIXi Stops Credential Theft

Introduction Two-factor authentication (2FA) has long been hailed as one of the most effective ways to safeguard online accounts against unauthorized access. However, despite its strength,…

MFA Cannot Stand Alone Series: The Risks of SIM Swapping
3 min

MFA Cannot Stand Alone Series: The Risks of SIM Swapping

Multi-Factor Authentication (MFA) is widely recognized for enhancing security by requiring at least two forms of verification: usually something you know (like a password) and something…

MFA Cannot Stand Alone Series – The DUO Hacking
3 min

MFA Cannot Stand Alone Series – The DUO Hacking

Unveiling the Limitations of MFA As was demonstrated in the previous blog post, MFA cannot stand alone. MFA, on its own, still leaves enterprise systems vulnerable…

MFA Cannot Stand Alone Series – AiTM Attacks and How UNIXi Deals With Them
4 min

MFA Cannot Stand Alone Series – AiTM Attacks and How UNIXi Deals With Them

As part of our 3-part series on MFA weaknesses, this initial post will delve into the Adversary in the Middle attacks, how they circumvent MFA, and…