9-vendor authentication roundup: The good, the bad and the ugly
Network World
JUNE 6, 2016
Due to numerous exploits that have defeated two-factor authentication, either by social engineering, remote access Trojans or various HTML injection techniques, many IT departments now want more than a second factor to protect their most sensitive logins and assets.
Let's personalize your content