With more than three decades of use, MFA is a proven method to reduce the risk of breaches due to stolen or weak credentials. While nearly any MFA method is an improvement over username and password alone, creative and resourceful attackers continue to expose weaknesses in legacy solutions such as token-based or telephony-based authentication. When considering or reviewing your secure access options, there are valuable lessons that can be learned from some of these real-world examples.
Join this grounded discussion on how MFA methods have evolved, a dissection of several successful attacks, and how modern MFA solutions fare against the same threats.
Technical Level: Medium