InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

MFA Fatigue – Fighting a 2-Front War

Presented by

Donovan Blaylock II, Director of Solutions Engineering, SecureAuth

About this talk

With cybercrime on the rise, more organizations are implementing best practices such as multi-factor authentication (MFA) to protect their users from credential theft, phishing attempts and brute-force password guessing. To get around this layer of protection, hackers have developed a new tactic: MFA fatigue or MFA bombing. It relies on spamming victims with endless authentication prompts until they grant the attacker access by accident or out of sheer frustration. Traditional MFA tactics have been around since the late ‘80’s. New techniques are long overdue to solve the underlying security challenges. Watch this webcast to learn from a cyber security veteran on how you can fight MFA fatigue with a 2-pronged strategy: significantly improve user experience while enhancing security via a new approach to passwordless continuous authentication. Frictionless user experience by reducing MFA prompts by 75% (without sacrificing security) Comprehensive device trust with transparent and dynamic level of assurance risk scores Overall improved security posture by empowering users to unlock, lock, or logout using their mobile devices
Identity Defined Security Alliance

Identity Defined Security Alliance

9328 subscribers159 talks
Vendor-neutral talks on reducing the risk of identity-related breaches
This channel brings together the leading identity and security vendors and industry experts to regularly educate security leaders on how to reduce risk through identity-centric strategies. For more resources and education on identity-centric security strategies, visit www.idsalliance.org.
Related topics