Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Problem With Two-Factor Authentication
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 4   >   >>
Auth_Pro
Auth_Pro,
User Rank: Apprentice
2/7/2014 | 3:07:47 PM
Preformed head to head with toopher,secureauth, okta, duo & securid
After a month long review of Toopher, Duo Security, Okta, SecureAuth and SecurID I can say that gartner was right about secureauth having the best customer service in the authentication space.  Toopher support was non existent, okta sales were pushy as heck, securid was a workable dinosaur which left duo and secureauth.  What secureauth put together was something that deployed quickly and worked for our use cases, duo deployed quickly too but only covered half of our use cases.
GGRAJEK
GGRAJEK,
User Rank: Apprentice
2/7/2014 | 3:07:20 PM
Re: Duo Security
Duo has very nice PUSH authentication - but as I stated - relying on a single form factor for authentication is setting the enterprise up for failure.    THe key is too abstract the authenticaiton and then be able to select the form factor most appropriate, PUSH Notification being one of the choices.   (THe others being  SMS, Telephony, X.509, OATH MObile tokens, Hard Tokens,  Gov't Issue  Credentials, Smart Cards, Social IDs, etc.)

And most importantly - construct a solution - that allows rapid (and secure) delivery/deployment of these authentication methodologies.   E.G. - as stated - this is where the hacks are occruing. 

 
CalistaHerdhart
CalistaHerdhart,
User Rank: Apprentice
2/7/2014 | 2:52:24 PM
Re: Two factor is useful after the data breach
Yea, we tried SecureAuth and it was great, transparent 2factor that worked with all of our cloud and internal apps, sso and password reset included.  Covered everything at a price point we could live with.  bye bye rsa securid tokens
moarsauce123
moarsauce123,
User Rank: Ninja
2/7/2014 | 2:49:27 PM
Re: Two factor is useful after the data breach
We tried Toopher here and it was a horrible waste of time...  Ended up looking elsewhere at the time, didn't know about Garret's concept which looks great.
anon2284099262
anon2284099262,
User Rank: Apprentice
2/7/2014 | 1:18:09 PM
Re: Two factor is useful after the data breach
RE Toopher, What would happen if someone stole your phone and knew where you did business. I would think that is sort of a single point of failure. 
Beck
Beck,
User Rank: Apprentice
2/7/2014 | 12:10:23 PM
Re: Two factor is useful after the data breach
Woah, thanks for the quick response! I didn't realize how many users Toopher has. I've never used LastPass but I'll go ahead and check that out too, thanks for the info.
smholloway
smholloway,
User Rank: Apprentice
2/7/2014 | 10:55:29 AM
Re: Two factor is useful after the data breach
@BGordon1 I think the concept of invisible authentication is a bit tricky because no one else is doing it. Toopher can automate authentication requests based on your location so that future requests from the same location are invisibly approved. For example, if you're logging into your bank's website from your home computer, the bank would ask Toopher to authenticate, Toopher would ping your phone, and your phone will respond for you (assuming you've chosen to automate the same request in the past); your bank logs you in without you having to type in a one time password or any of that nonsense. It's still a second factor--it's just invisible. The Toopher site might explain it better than I can: https://www.toopher.com/.
M_Gordon
M_Gordon,
User Rank: Apprentice
2/7/2014 | 10:41:17 AM
Re: Two factor is useful after the data breach
@BGordon1

I use Toopher with LastPass and absolutly love it! What they mean by invisible is their automation feature. Toopher uses location awareness of your smartphone to automate authentication so that you don't have to take any extra steps - like having to type in any passcodes to complete the authentication process. It is the most user friendly 2fa I have experienced. Check out this video... it helped me better understand what Toopher does. 

http://www.youtube.com/watch?v=k78xDTpy7PU
Beck
Beck,
User Rank: Apprentice
2/7/2014 | 10:33:11 AM
Re: Two factor is useful after the data breach
What exactly do you mean by invisible? Does Toopher remember your credentials or cookies and automatically log you in on your mobile device? I could see a lot of holes in that security. Excellent point about the post-breach security though. I definitely agree that 2fa is an important step.
SaneIT
SaneIT,
User Rank: Apprentice
2/6/2014 | 8:28:05 AM
Re: Beyond authentication
Yes I believe that we should view it as a good practice but we should not rely on authentication as the sole source of protection.  A majority of data loss/misuse comes from internal sources so part of the battle has to be monitoring and swift action when irregularities are detected.
<<   <   Page 2 / 4   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type=&quot;text&quot;` via a javascript &quot;Show Password&quot; button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn&acirc;&euro;&trade;t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file