Thinking Twice Before Using 2FA

Why Two-Factor Authentication is Quickly Becoming Obsolete 2 Factor Authentication (2FA), a form of Multi-factor Authentication (MFA) or Multi-Step Verification, adds another layer of security, supplementing the username and password model with a code that only a specific user has access to (typically sent to something they have immediately to hand). It has quickly become […]

Read More
White Paper

Building a Culture of Threat Modeling

The growth and complexity of modern cyber threats has led cyber-forward enterprises to implement practices that predict the techniques of their adversaries. Sophisticated information security teams are increasingly adopting proactive measures to understand the landscape of potential security threats and adapt accordingly. What is a Threat Model Threat modeling is a structured approach for reviewing […]

Read More