Reddit Breach Takeaways: MFA and Access Management Posted on 08 August 2018 by Amanda Rogerson in Enterprise Security Reddit has been hacked! Their SMS based authentication was not strong enough to prevent a breach, so they will be moving towards token-based two-factor authentication… Considering Access Management – PART #4 Posted on 11 July 2018 by Amanda Rogerson in Enterprise Security In this series about considering access management, we've explored ideas around why organizations are adopting IAM solutions, what applications need to be protected and what… Considering Access Management – PART #3 Posted on 10 July 2018 by Amanda Rogerson in Enterprise Security We've explored why organizations are considering implementing identity and access management solutions (IAM). The solution should not only consider WHO and WHAT needs to be… Considering Access Management – PART #2 Posted on 03 July 2018 by Amanda Rogerson in Enterprise Security When looking at IAM solutions it is important to consider WHO needs to validated and WHAT needs to have access controls around it. The most… When Prince Harry Met Access Management Posted on 19 June 2018 by Ronni Kives in Enterprise Security From The Royal Wedding to top secret projects, learn how fashion designers around the globe can keep their designs safe and ensure the security of… Before You Choose Microsoft – 5 Access Management Considerations Posted on 16 April 2018 by Mor Ahuvia in Enterprise Security Learn the 5 key factors to consider when shopping for an access management solution. Choosing a solution is not an easy decision and addressing your… Posts navigation Older posts From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.