inWebo Blog: Exploring Authentication, Identity, Privacy, and Security

5 most common challenges about MFA

The 5 Most Common Challenges of MFA – A Simple Guide to Analyzing Solutions

Posted by | inWebo Blog: Exploring Authentication, Identity, Privacy, and Security | No Comments

The selection of the “right” MFA solution can be tricky. First, because there’s a constant flow of innovation in the authentication industry, resulting in numerous and diverse technologies even for solutions supposedly following a standard. Second, because the applications and environments needing MFA are also very different (cloud vs. onprem, legacy vs. web, ldap vs. radius, SAML, or OIDC, etc.). Lastly because not all solutions have the same objectives or protect against the same risks. Read More

What MFA for the IoT

What MFA do we need for the IoT?

Posted by | inWebo Blog: Exploring Authentication, Identity, Privacy, and Security | No Comments

As we should all know by now, 1/ everything is getting connected, the Internet is no longer about computers and servers only but also about billions of objects that once belonged to distinct categories, such as consumer electronics, automotive, medical devices, industrial and infrastructure systems etc. And 2/, security issues are going to be even larger and scarier in the era of the Internet of Things.

This raises a few questions for the cybersecurity industry, such as: Are we ready to address this challenge? Have we developed the right tools yet? The short answer is no. Read More

Biometry two birds one stone

Biometry: Two Birds with One Stone

Posted by | inWebo Blog: Exploring Authentication, Identity, Privacy, and Security | No Comments

Passwords are prehistory. Passwords are dead. We’re going to end passwords. Sounds familiar? Google probably has millions of results for each of these searches. Yet, for as long as I can remember – since the rise of the World Wide Web at least – passwords have been fingerpointed as the flaw in this otherwise amazingly well engineered system. Read More

WannaCry, now what

#WannaCry, now what?

Posted by | inWebo Blog: Exploring Authentication, Identity, Privacy, and Security | No Comments

It was supposed to be a nice weekend, but for many people working in IT and security organizations, last weekend turned out to be a nightmare. A self-replicating ransomware going by the name of WannaCry hit several hundreds of thousands of computers worldwide, many of them in large organizations – the NHS, Renault, and Telefonica have been mentioned in the news. Every time such an attack makes it to the headlines, the priority for IT and security people is to manage the crisis: contain the spread, eradicate the worm, and resume normal business operations. This can take hours or days (and nights), sometimes longer, but hopefully everything is back to normal before the next one hits.

Read More

Best-of-breed or packaged, how would you like your MFA?

Best-of-breed or packaged, how would you like your MFA?

Posted by | inWebo Blog: Exploring Authentication, Identity, Privacy, and Security | No Comments

I attended the Gartner IAM Summit in Vegas this week. Great conference, lots of smart and inspiring people. Multi-Factor Authentication (aka MFA or 2FA or 2-factor…) was a frequent topic of discussion, both in the analysts sessions, who did brilliant projections of the market trends – future, present, and past – and in the Access Manager vendors’ booths.

Read More

MFA moving to mobile

Why Is Mobile Best Suited for 2FA – Or Not

Posted by | inWebo Blog: Exploring Authentication, Identity, Privacy, and Security | No Comments

We use routers to move IP packets across the Internet and toasters to get crispy bagels. There are all kinds of brands, versions, and management features, but overall, routing and toasting each use a single technology. Authentication does not, especially when it comes to multi-factor (MFA or 2FA). Why is that, and is Mobile the platform where authentication will eventually converge? Read More

Risks, Compliance, Standards, and MFA

Posted by | inWebo Blog: Exploring Authentication, Identity, Privacy, and Security | No Comments

In most organizations, security solutions (and in particular MFA, multi-factor authentication) are not requested by the security department or even IT, they are mandated by the risks & compliance team. Indeed, although protecting information systems against intrusions and using specific technology for that sounds obvious, very few companies deploy a protection in anticipation. They more than often delay it until they are required to – or until they are hit so badly that they nearly go out of business (giving recent examples would make this blog post considerably too long).

Read More