Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

How Your End Users Can Enable Their Mobile Phones to Act as 2FA Devices, Part 3

by Tom McLaughlin, posted in Cloud Security, 2FA, 2-Factor Authentication

TS16031_ThreatStack_DuoSecurity2FA_Part3_BlogImg.jpg

This is the third and final post in our series on using 2-Factor Authentication (2FA). In the first, we talked about why you need to replace SMS as a means of achieving 2FA, and introduced Duo Security as an effective way of doing this. In the second, we gave guidelines for setting up Duo Security at your organization.

Read More [fa icon=long-arrow-right"]

Aug 19, 2016 2:05:15 PM

[fa icon="comment"] 0 Comments

How to Implement 2FA Security in Your Organization Using Duo Security, Part 2

by Tom McLaughlin, posted in Cloud Security, 2FA, 2-Factor Authentication

TS16031_ThreatStack_DuoSecurity2FA_Part2_BlogImg.jpg

In a recent blog post I spoke about the need to find another way of achieving 2-Factor Authentication now that SMS has been deprecated by the National Institute for Science and Technology.

In this post I’m going to offer some guidance, based on my experience at Threat Stack, on how you can implement Duo Security as an easy and effective way of providing a secondary level of authentication in a 2FA throughout your organization. Along the way, I’ll point out some of the key factors and best practices you should take into account to make sure your setup is usable, based on strategy (i.e., you’re not setting up a feature just because you can), and addresses the actual security needs of your particular company.

Read More [fa icon=long-arrow-right"]

Aug 5, 2016 10:05:34 AM

[fa icon="comment"] 0 Comments

How to Replace SMS 2-Factor Authentication With Duo Security 2FA, Part 1

by Tom McLaughlin, posted in Cloud Security, 2FA, 2-Factor Authentication

TS16031_ThreatStack_DuoSecurity2FA_BlogImg-1.jpg

You’ve probably been investigating 2-Factor Authentication (2FA) more and more recently. With each new data breach or password dump in the news, you increasingly realize that security doesn’t end with strong passwords.

Read More [fa icon=long-arrow-right"]

Aug 3, 2016 9:47:37 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all