I listened to an interesting Steve Gibson podcast on this same subject and tend to agree with Steve that this is a decent implementation of a stronger single factor authentication mechanism, but it is far from multi-factor authentication. This can certainly replace weak passwords with a slightly stronger authentication mechanism, but it most instances, real security will require a second, truly secret authentication factor.
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page