Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The Problem With Two-Factor Authentication
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 4   >   >>
User Rank: Apprentice
2/7/2014 | 3:07:47 PM
Preformed head to head with toopher,secureauth, okta, duo & securid
After a month long review of Toopher, Duo Security, Okta, SecureAuth and SecurID I can say that gartner was right about secureauth having the best customer service in the authentication space.  Toopher support was non existent, okta sales were pushy as heck, securid was a workable dinosaur which left duo and secureauth.  What secureauth put together was something that deployed quickly and worked for our use cases, duo deployed quickly too but only covered half of our use cases.
User Rank: Apprentice
2/7/2014 | 3:07:20 PM
Re: Duo Security
Duo has very nice PUSH authentication - but as I stated - relying on a single form factor for authentication is setting the enterprise up for failure.    THe key is too abstract the authenticaiton and then be able to select the form factor most appropriate, PUSH Notification being one of the choices.   (THe others being  SMS, Telephony, X.509, OATH MObile tokens, Hard Tokens,  Gov't Issue  Credentials, Smart Cards, Social IDs, etc.)

And most importantly - construct a solution - that allows rapid (and secure) delivery/deployment of these authentication methodologies.   E.G. - as stated - this is where the hacks are occruing. 

User Rank: Apprentice
2/7/2014 | 2:52:24 PM
Re: Two factor is useful after the data breach
Yea, we tried SecureAuth and it was great, transparent 2factor that worked with all of our cloud and internal apps, sso and password reset included.  Covered everything at a price point we could live with.  bye bye rsa securid tokens
User Rank: Ninja
2/7/2014 | 2:49:27 PM
Re: Two factor is useful after the data breach
We tried Toopher here and it was a horrible waste of time...  Ended up looking elsewhere at the time, didn't know about Garret's concept which looks great.
User Rank: Apprentice
2/7/2014 | 1:18:09 PM
Re: Two factor is useful after the data breach
RE Toopher, What would happen if someone stole your phone and knew where you did business. I would think that is sort of a single point of failure. 
User Rank: Apprentice
2/7/2014 | 12:10:23 PM
Re: Two factor is useful after the data breach
Woah, thanks for the quick response! I didn't realize how many users Toopher has. I've never used LastPass but I'll go ahead and check that out too, thanks for the info.
User Rank: Apprentice
2/7/2014 | 10:55:29 AM
Re: Two factor is useful after the data breach
@BGordon1 I think the concept of invisible authentication is a bit tricky because no one else is doing it. Toopher can automate authentication requests based on your location so that future requests from the same location are invisibly approved. For example, if you're logging into your bank's website from your home computer, the bank would ask Toopher to authenticate, Toopher would ping your phone, and your phone will respond for you (assuming you've chosen to automate the same request in the past); your bank logs you in without you having to type in a one time password or any of that nonsense. It's still a second factor--it's just invisible. The Toopher site might explain it better than I can: https://www.toopher.com/.
User Rank: Apprentice
2/7/2014 | 10:41:17 AM
Re: Two factor is useful after the data breach

I use Toopher with LastPass and absolutly love it! What they mean by invisible is their automation feature. Toopher uses location awareness of your smartphone to automate authentication so that you don't have to take any extra steps - like having to type in any passcodes to complete the authentication process. It is the most user friendly 2fa I have experienced. Check out this video... it helped me better understand what Toopher does. 

User Rank: Apprentice
2/7/2014 | 10:33:11 AM
Re: Two factor is useful after the data breach
What exactly do you mean by invisible? Does Toopher remember your credentials or cookies and automatically log you in on your mobile device? I could see a lot of holes in that security. Excellent point about the post-breach security though. I definitely agree that 2fa is an important step.
User Rank: Apprentice
2/6/2014 | 8:28:05 AM
Re: Beyond authentication
Yes I believe that we should view it as a good practice but we should not rely on authentication as the sole source of protection.  A majority of data loss/misuse comes from internal sources so part of the battle has to be monitoring and swift action when irregularities are detected.
<<   <   Page 2 / 4   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.