Most major organisations working with Microsoft systems will use Active Directory (AD) to centrally authenticate all resources on a network based on a central database. The solution, in theory, is a way to centrally manage user security, which sounds appealing to large organisations. The reality, however, is that AD is not secure on its own..
July 2019 marked the passing of respected computer pioneer, Fernando Corbato, aged 93, who had a long and illustrious career in technology leaving many great legacies to the field of technology, including 50 years of passwords. Inventor of the password Dr Corbato is perhaps most famous for inventing the password. But this invention was actually..
Passwords, 2-factor authentication, multi-factor authentication – do you need to know what they mean? Or are we now entering the realm of x-factor authentication where the method used is essentially transparent to the user? Whichever authentication method is implemented, the focus has to be to ensure that it is fully compliant and that x-factor authentication..
In his latest video blog, Global Account Manager at Authlogics, Kamber Devjianie, explains why organisations still reliant on hard-tokens as part of their multi-factor authentication strategy need to seriously re-evaluate their usage, in light of the tried and test soft-token alternatives, which can work as part of a 1.5FA, 2FA and 3FA solution. He explains how..
Last week I posted a video explaining Authlogics approach to 1.5FA. This week, I want to talk about 3FA which is an extension of 2FA (something you have and something you know) by the addition of something you are doing that is specific to a task, typically known in the industry as transaction signing.
Way back in December 2012, I met with a journalist in London to introduce the concept of 1.5FA. Roll forward four years and I find myself still having similar conversations. Organisations are desperately looking for a more flexible approach to how they deploy authentication. There are instances where 2FA and 3FA are a requirement (it may be..
How you manage the public fall-out from a cyberattack is in many respects just as important as how it is being dealt with internally. Whist, at the time of writing, the details of the Tesco Bank incident have yet to be revealed, they can be applauded for opening the lines of communication quickly, but is..
In his latest video blog, Kamber Devjianie from Authlogics talks about the multi-factor alternatives available on the market right now, that can enable you to free your customers, clients, employees and IT department from password-based authentication. He explains single-sign-on, the use of biometric readers on smart devices as a method of convenience rather than security and introduces PINgrid a viable alternative to passwords.
I am used to reading articles calling for passwords to be replaced, in fact I have written a number of them myself. However, I was shocked to read the headline on DARKreading “Multi-factor IT Authentication Hampers Progress, Says 47% US Companies”. However, should I have been surprised? Maybe yes and maybe no. The story was..
Early on Monday morning, I was dashing to catch a train in to London. In order to get the best priced fare my Office Manager had diligently booked my ticket in advance. With just ten minutes to spare I arrived at the station, coffee and croissant in hand. I found my way to the advance ticket..