2FA - Advice For Deployment & A Technical Assessment

July 30, 2019 Digital Shadows

Thinking about deploying 2FA? In this special interview, our Head of Cyber Security & IT, Craig Ellis, and our Head of Security Engineering, Dr. Richard Gold, chat with Harrison around how they implemented 2FA internally. The guys discuss proper ways to go about implementing 2FA, some of the issues with implementing 2FA, what happens when things break, and other advice they wish they were given before implementing 2FA.

Then Rich and Harrison deep dive into our latest paper, Two-Factor in Review, a technical assessment of the most popular mitigation for account takeover attacks. Check out the full report below to read for yourself.

Blog on 2FA: https://www.digitalshadows.com/blog-and-research/the-account-takeover-kill-chain-a-five-step-analysis/

Report on Account Takeover: https://resources.digitalshadows.com/whitepapers-and-reports/two-factor-in-review

Previous Post
Dark Web Typosquatting: Scammers v. Tor
Dark Web Typosquatting: Scammers v. Tor

Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business worl...

Next Post
FBI IC3: Cybercrime Surges in 2018, Causing $2.7 Billion in Losses
FBI IC3: Cybercrime Surges in 2018, Causing $2.7 Billion in Losses

This week, the Federal Bureau of Investigation released its 2018 Internet Crime Complaints Center (IC3). In...