Articles from Amit Rahav on the Octopusblog

2017 Phone as an Authenticator; Methods, Benefits and Risks

Traditionally, OTP tokens (hardware based) have been used to ensure the identity of the party seeking to connect to that sensitive information. But the explosion of mobile devices makes hardware-based tokens impractical. In addition, many users balk at the idea of carrying around a bulky piece of hardware in order to access secure resources. In addition, a 2012 study indicated that companies could save as much as 95% of authentication costs by replacing tokens with smart device-based software solutions. In a study, Gartner said that “phone as a token are the methods of choice in a majority of new and refreshed token deployments, and have a larger installed base than OTP hardware tokens.”

Microsoft is replacing the password — what’s taking its place?

Posted on beta news magazine, May 1, 2017 by Amit Rahav If implemented correctly, this system is a lot more secure than the one that prevails now, where users login with their password, since there are now two or more factors that are being used to authenticate the user It was supposed to have died a long time ago, but, for a near-cadaver, [...]

Howdy,
Search exact
Search sentence
Buy Premium Version to add more powerful tools to this place. https://wpclever.net/downloads/wp-admin-smart-search