Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Problem With Two-Factor Authentication
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 4   >   >>
Auth_Pro
Auth_Pro,
User Rank: Apprentice
2/7/2014 | 3:07:47 PM
Preformed head to head with toopher,secureauth, okta, duo & securid
After a month long review of Toopher, Duo Security, Okta, SecureAuth and SecurID I can say that gartner was right about secureauth having the best customer service in the authentication space.  Toopher support was non existent, okta sales were pushy as heck, securid was a workable dinosaur which left duo and secureauth.  What secureauth put together was something that deployed quickly and worked for our use cases, duo deployed quickly too but only covered half of our use cases.
GGRAJEK
GGRAJEK,
User Rank: Apprentice
2/7/2014 | 3:07:20 PM
Re: Duo Security
Duo has very nice PUSH authentication - but as I stated - relying on a single form factor for authentication is setting the enterprise up for failure.    THe key is too abstract the authenticaiton and then be able to select the form factor most appropriate, PUSH Notification being one of the choices.   (THe others being  SMS, Telephony, X.509, OATH MObile tokens, Hard Tokens,  Gov't Issue  Credentials, Smart Cards, Social IDs, etc.)

And most importantly - construct a solution - that allows rapid (and secure) delivery/deployment of these authentication methodologies.   E.G. - as stated - this is where the hacks are occruing. 

 
CalistaHerdhart
CalistaHerdhart,
User Rank: Apprentice
2/7/2014 | 2:52:24 PM
Re: Two factor is useful after the data breach
Yea, we tried SecureAuth and it was great, transparent 2factor that worked with all of our cloud and internal apps, sso and password reset included.  Covered everything at a price point we could live with.  bye bye rsa securid tokens
moarsauce123
moarsauce123,
User Rank: Ninja
2/7/2014 | 2:49:27 PM
Re: Two factor is useful after the data breach
We tried Toopher here and it was a horrible waste of time...  Ended up looking elsewhere at the time, didn't know about Garret's concept which looks great.
anon2284099262
anon2284099262,
User Rank: Apprentice
2/7/2014 | 1:18:09 PM
Re: Two factor is useful after the data breach
RE Toopher, What would happen if someone stole your phone and knew where you did business. I would think that is sort of a single point of failure. 
Beck
Beck,
User Rank: Apprentice
2/7/2014 | 12:10:23 PM
Re: Two factor is useful after the data breach
Woah, thanks for the quick response! I didn't realize how many users Toopher has. I've never used LastPass but I'll go ahead and check that out too, thanks for the info.
smholloway
smholloway,
User Rank: Apprentice
2/7/2014 | 10:55:29 AM
Re: Two factor is useful after the data breach
@BGordon1 I think the concept of invisible authentication is a bit tricky because no one else is doing it. Toopher can automate authentication requests based on your location so that future requests from the same location are invisibly approved. For example, if you're logging into your bank's website from your home computer, the bank would ask Toopher to authenticate, Toopher would ping your phone, and your phone will respond for you (assuming you've chosen to automate the same request in the past); your bank logs you in without you having to type in a one time password or any of that nonsense. It's still a second factor--it's just invisible. The Toopher site might explain it better than I can: https://www.toopher.com/.
M_Gordon
M_Gordon,
User Rank: Apprentice
2/7/2014 | 10:41:17 AM
Re: Two factor is useful after the data breach
@BGordon1

I use Toopher with LastPass and absolutly love it! What they mean by invisible is their automation feature. Toopher uses location awareness of your smartphone to automate authentication so that you don't have to take any extra steps - like having to type in any passcodes to complete the authentication process. It is the most user friendly 2fa I have experienced. Check out this video... it helped me better understand what Toopher does. 

http://www.youtube.com/watch?v=k78xDTpy7PU
Beck
Beck,
User Rank: Apprentice
2/7/2014 | 10:33:11 AM
Re: Two factor is useful after the data breach
What exactly do you mean by invisible? Does Toopher remember your credentials or cookies and automatically log you in on your mobile device? I could see a lot of holes in that security. Excellent point about the post-breach security though. I definitely agree that 2fa is an important step.
SaneIT
SaneIT,
User Rank: Apprentice
2/6/2014 | 8:28:05 AM
Re: Beyond authentication
Yes I believe that we should view it as a good practice but we should not rely on authentication as the sole source of protection.  A majority of data loss/misuse comes from internal sources so part of the battle has to be monitoring and swift action when irregularities are detected.
<<   <   Page 2 / 4   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-31104
PUBLISHED: 2022-06-28
Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime's implementation of the SIMD proposal for WebAssembly on x86_64 contained two distinct bugs in the instruction lowerings implemented in Cranelift. The aarch64 implementation of the simd proposal is not affected. The bugs...
CVE-2022-34132
PUBLISHED: 2022-06-28
Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at application/controllers/Leaves.php.
CVE-2022-34133
PUBLISHED: 2022-06-28
Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Comment parameter at application/controllers/Leaves.php.
CVE-2022-34134
PUBLISHED: 2022-06-28
Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /application/controllers/Users.php.
CVE-2022-31099
PUBLISHED: 2022-06-27
rulex is a new, portable, regular expression language. When parsing untrusted rulex expressions, the stack may overflow, possibly enabling a Denial of Service attack. This happens when parsing an expression with several hundred levels of nesting, causing the process to abort immediately. This is a s...