MFA-VPN is the first enterprise VPN appliance to support the FIDO standard! As such, MFA-VPN can optionally authenticate users with Yubikey U2F devices. By combining OpenOTP flexible OTP methods and FIDO-U2F, MFA-VPN is also the world’s most advanced VPN server in terms of strong authentication
Swipe to login, tap to accept or push to login, the de-facto two-factor login of today has many names.
As it now stands, any company with a web service can easily inaugurate two factor, without being pulled into myriad of obstacles lurking in shadows of corporate identity and access. There aren’t great many myriads around what in technical terms is called push login, a
Recently discovered vulnerabilities in machine hardware have raised questions about hackers being able to gain access to passwords and other valuable data. The vulnerabilities are known to effect every processor made in the last 20 years.
Oracle has released its first update round of the year, which includes fixes for products affected by one of the recently disclosed Spectre CPU vulnerabilities.
A 19-year-old vulnerability has been re-discovered in the RSA implementation from at least 8 different vendors—including F5, Citrix, and Cisco—that can give man-in-the-middle attackers access to encrypted messages.
For those of us in the real world, this is a reminder that although prevention is better than cure, giving up shouldn’t be an option with a prompt reaction to a security violation, there may yet still be time to head the attacker off at
According to the survey results, collected from more than 600 global enterprise businesses, 90% of companies are expecting to see their volume of connected devices increase over the next few years, but 77% agreed that the increased usage of connected devices creates significant security
RCDevs’s unique Windows offline support in latest OpenOTP Credential Provider allows users login to Windows with OTP anywhere and at any time, providing superior all encompassing 2FA solution for all Windows access.
A global study indicates that disgruntled former employees (or threat actors taking advantage of them) have a widespread opportunity to cause harm within companies—because their IT accounts remain active, often months after they leave their jobs.
Finding a good candidate, or possibly any candidate, to fill one of the thousands of open cybersecurity positions available is one of the greatest challenges facing security executives today.