CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
MFA
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

MFA

Hand cover smartphone with username and password screen showing MFA bypass by cyber attackers
Cyber SecurityInsights

Seven Ways Cyber Attackers Bypass MFA – And How To Stop Them

January 25, 2023
MFA can be circumvented by modern identity attack techniques. Thwarting cyber attackers starts by understanding the techniques they rely on to bypass MFA protected users, and responding with a holistic, well-rounded identity security strategy that can fill these gaps.
Read More
Computer security code and virtual locks showing lateral movement and need for MFA
Cyber SecurityInsights

A Decade of Discussion and We’re Still Not Thinking Laterally

December 6, 2022
Lateral movement has been a common factor in breaches, using identity as a universal attack vector to traverse environments unchecked. Organizations must have full visibility of the threat posed by identity and proactively wrap MFA round exposed assets.
Read More
Man typing on keyboard of laptop showing PAM and MFA affects cyber insurance premiums
Cyber SecurityInsights

How PAM, MFA Helps Organizations Meet Cyber Insurance Requirements

September 27, 2022
Given that compromised credentials are a leading cause of cyber attacks, many cyber insurance underwriters are looking for robust privileged access management (PAM) and multifactor authentication (MFA) controls before pricing out their policies.
Read More
Rain on umbrella showing cyber insurance and need for MFA
Cyber SecurityInsights

How MFA Minimizes Impact for Cyber Insurance Coverage

March 24, 2022
Many cyber insurance providers are now requiring basic security hygiene from their customers. One of those requirements is multi-factor authentication (MFA), which adds a layer of protection to sign-in processes.
Read More
Virtual lock and key in front of hands typing on the laptop keyboard
Cyber SecurityInsights

Three Keys to a Successful Zero-trust Implementation

March 21, 2022
The quick transition to the Zero-Trust model is mainly fueled by remote work, cloud adoption and an increase in deploying devices in recent years. Having the right security solutions to support a Zero-Trust strategy is critical. Here are three keys to implement a Zero-Trust approach successfully.
Read More

Latest

WhatsApp app icon on a smartphone showing GDPR violations

WhatsApp Receives €5.5 Million Fine for GDPR Violations

League of Legends website page showing security breach of game cheats and source code

Security Breach at Riot Games Reveals Game Cheats, Source Code for Popular eSport “League of Legends”

African woman raising hand to ask question at team security awareness training

7 Tips for Launching a Security Awareness Training Program

KFC Drive thru at night showing ransomware attack

KFC, Pizza Hut, and Taco Bell Ransomware Attack Shuts Down 300 Restaurants in the UK

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results