Get a Pentest and security assessment of your IT network.

News

Moving Beyond 2-Factor Authentication With Context

With context-based authentication, your organization can create rules that determine, pre-authentication, whether and how a given authentication process should proceed based on context. For example, the IP address of a users machine is part of the Tor anonymity network, a known botnet, or an IP or subnet associated with known bad actors can be denied. By comparing a user’s current information with the corresponding information kept in a directory or user store, you can thwart attackers attempting to use credentials they have created.”]

Source: https://www.darkreading.com/authentication/moving-beyond-2-factor-authentication-with-context-

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin