SECURE TOKENS:PREVENTING TWO-FACTOR TOKEN AUTHENTICATION EXPLOITS

SECURE TOKENS:PREVENTING TWO-FACTOR TOKEN AUTHENTICATION EXPLOITS

Cover

Data has become a focal point of today’s businesses. And because of this, security administrators have stepped up their game to ensure that that their organization’s data is secure. Unfortunately, so have attackers. This expert guide examines on the common types of attacks used against two-factor authentication, and discusses what they can mean for future security threats and how you can protect against them.

Vendor:
SearchSecurity.com
Posted:
18 Sep 2013
Published
18 Sep 2013
Format:
PDF
Type:
eGuide
Language:
English
Already a Bitpipe member? Login here

Download this eGuide!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy