Moving Beyond 2-Factor Authentication With ‘Context’

https://www.flickr.com/photos/thescream/5556276740/

What’s the best way to protect your proprietary business secrets or financial data? One common recommendation is to implement two-factor authentication. As you undoubtedly know, two-factor authentication limits the usefulness of any credentials that attackers may have acquired or created, restricting their ability to move laterally within the organization or access your VPN to log back in remotely and attempt to gain ever more powerful credentials.

Tags: 

Read more: Moving Beyond 2-Factor Authentication With ‘Context’

Story added 7. December 2014, content source with full text you can find at link above.