2FA - Advice For Deployment & A Technical Assessment

July 30, 2019 Digital Shadows

Thinking about deploying 2FA? In this special interview, our Head of Cyber Security & IT, Craig Ellis, and our Head of Security Engineering, Dr. Richard Gold, chat with Harrison around how they implemented 2FA internally. The guys discuss proper ways to go about implementing 2FA, some of the issues with implementing 2FA, what happens when things break, and other advice they wish they were given before implementing 2FA.

Then Rich and Harrison deep dive into our latest paper, Two-Factor in Review, a technical assessment of the most popular mitigation for account takeover attacks. Check out the full report below to read for yourself.

Blog on 2FA: https://www.digitalshadows.com/blog-and-research/the-account-takeover-kill-chain-a-five-step-analysis/

Report on Account Takeover: https://resources.digitalshadows.com/whitepapers-and-reports/two-factor-in-review

Previous Post
Capital One Breach, Ransomware Trends, and Threat Actors
Capital One Breach, Ransomware Trends, and Threat Actors

Move out of the way, Harrison! We have a brand new host this week: Viktoria Austin, Strategy and Research A...

Next Report
Too Much Information: The Sequel | New Research
Too Much Information: The Sequel | New Research

There are now 750 million more files exposed than we reported last year; not all of them are blatantly sens...