Is Multifactor Authentication Enough?

As more organizations are moving to multifactor authentication (see our reference article “Who are you…who who?”), cyberattackers are finding ways around the authentication method.  As reported in Dark Reading, cyberattackers are using objects called session cookies that are temporary text files that identify you when accessing a web site.  Because...
Read More

Blog Categories