-
Is the federal government able to comply with our requirements for strong authentication, file encryption, vulnerability and patch management, and privileged user controls?
FORBES: An Open Letter to Senator Rockefeller
-
PhoneFactor is one company that is gaining traction with two factor (strong) authentication based on mobile devices.
FORBES: Perhaps Sony should consider strong authentication?
-
Those innocuous traits led investigators to initially believe the computer access from China using Bob's credentials was unauthorized -- and that some form of malware was sidestepping strong two-factor authentication that included a token RSA key fob under Bob's name.
CNN: STORY HIGHLIGHTS