CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
MFA
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

MFA

Computer security code and virtual locks showing lateral movement and need for MFA
Cyber SecurityInsights

A Decade of Discussion and We’re Still Not Thinking Laterally

December 6, 2022
Lateral movement has been a common factor in breaches, using identity as a universal attack vector to traverse environments unchecked. Organizations must have full visibility of the threat posed by identity and proactively wrap MFA round exposed assets.
Read More
Rain on umbrella showing cyber insurance and need for MFA
Cyber SecurityInsights

How MFA Minimizes Impact for Cyber Insurance Coverage

March 24, 2022
Many cyber insurance providers are now requiring basic security hygiene from their customers. One of those requirements is multi-factor authentication (MFA), which adds a layer of protection to sign-in processes.
Read More
Man typing on keyboard of laptop showing PAM and MFA affects cyber insurance premiums
Cyber SecurityInsights

How PAM, MFA Helps Organizations Meet Cyber Insurance Requirements

September 27, 2022
Given that compromised credentials are a leading cause of cyber attacks, many cyber insurance underwriters are looking for robust privileged access management (PAM) and multifactor authentication (MFA) controls before pricing out their policies.
Read More
Hand cover smartphone with username and password screen showing MFA bypass by cyber attackers
Cyber SecurityInsights

Seven Ways Cyber Attackers Bypass MFA – And How To Stop Them

January 25, 2023
MFA can be circumvented by modern identity attack techniques. Thwarting cyber attackers starts by understanding the techniques they rely on to bypass MFA protected users, and responding with a holistic, well-rounded identity security strategy that can fill these gaps.
Read More
Virtual lock and key in front of hands typing on the laptop keyboard
Cyber SecurityInsights

Three Keys to a Successful Zero-trust Implementation

March 21, 2022
The quick transition to the Zero-Trust model is mainly fueled by remote work, cloud adoption and an increase in deploying devices in recent years. Having the right security solutions to support a Zero-Trust strategy is critical. Here are three keys to implement a Zero-Trust approach successfully.
Read More

Latest

Person about to delete TikTok showing UK TikTok ban on government devices

Following US Federal TikTok Ban, UK Blocks the App From Government Devices

Finger tapping TikTok logo on mobile phone showing TikTok employee claims of user data leak

Former TikTok Employee Claims User Data Still Leaking to China, Company Was “Intentionally Lying” to US Regulators

Closeup of a Falcon 9 booster rocket at SpaceX showing LockBit ransomware breached third party vendor

SpaceX Third Party Vendor Hit by LockBit Ransomware, Gang Claims That It Stole Engineering Schematics

Image of team working together on cybersecurity framdworks for privacy regulations

Meet Data Privacy Mandates With Cybersecurity Frameworks

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results