• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: multifactor authentication

New AuthPoint Multifactor Authentication from WatchGuard

Designed specifically for SMBs in search of affordable, easy-to-use security tools, AuthPoint is WatchGuard’s first entirely software-based solution, and utilizes the new WatchGuard Cloud management console. 

August 1, 2018 Rich Freeman Leave a Comment

Designed specifically for SMBs in search of affordable, easy-to-use security tools, AuthPoint is WatchGuard’s first entirely software-based solution, and utilizes the new WatchGuard Cloud management console. 

Read More

Token Announces $13 Million Series B Funding Round and Appointment of New CEO to Disrupt the Authentication Market

June 29, 2022 TechDecisions Staff Leave a Comment

Investment led by Grand Oaks Capital to accelerate development of innovative wearable biometric authentication solutions. ROCHESTER, N.Y.–(BUSINESS WIRE)–#authentication—Token, a revolutionary provider of secure, wearable authentication solutions, today announced a $13 million financing round and the appointment of John Gunn as the company’s CEO. Token will use the funds to increase its investment in solution development […]

Read More

Michigan State University Utilized Biometric Access Control for Research Lab

The ZKAccess access control multifactor authentication biometrics system provides a barrier of security to the Michigan State University research laboratory.

December 26, 2017 TechDecisions Staff Leave a Comment

The ZKAccess access control multifactor authentication biometrics system provides a barrier of security to the Michigan State University research laboratory.

Read More

Phishing, Email security

Email Attacks are Evading Security Protections. Here’s How Security Teams Should Respond.

IT, security teams and end users should take these actions to combat increasingly sophisticated email threats.

June 6, 2023 Trevor Collins Leave a Comment

Instances of business email compromise (BEC) – a targeted form of phishing in which attackers try to scam companies out of money or goods or trick employees into giving up sensitive info – have continued to increase, causing devastating impacts. Last year, the FBI’s Internet Crime Complaint Center (IC3) reported $43 billion of global exposed […]

Read More

FTC Ring

FTC Accuses Ring of Watching Private Videos, Poor Security Practices

The FTC has charged Ring with compromising its customers’ privacy and failing to implement basic privacy and cybersecurity protections.

June 1, 2023 Jason Knott Leave a Comment

The Federal Trade Commission (FTC) has charged Ring with compromising its customers’ privacy by allowing any employee or contractor to access consumers’ private videos and by failing to implement basic privacy and security protections, enabling hackers to take control of consumers’ accounts, cameras, and videos. While the FTC only mentions consumer customers, Ring does offer commercial security […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

New Email Rules, MFA Bypass Are Top Hacking Tactics So Far in 2023

Cybersecurity firm Expel's 2023 first quarter threat report finds that hackers are hiding their activity with email rules and bypassing MFA.

June 1, 2023 Zachary Comeau Leave a Comment

Account compromise, new inbox rules designed to hide malicious activity, and multifactor authentication bypass are the most popular hacking tactics being utilized by threat actors so far in 2023, according to a new report from cybersecurity firm Expel. According to the managed detection and response provider, identity-based attacks such as account compromise, account takeover and […]

Read More

VMware EXSi security

CrowdStrike: VMware ESXi in the RaaS Crosshairs

Cybersecurity researchers are noting an uptick in Ransomware-as-a-Service groups targeting VMware ESXi vSphere hypervisors.

May 15, 2023 Zachary Comeau Leave a Comment

Cyberattacks are continuing to target VMware ESXi vSphere hypervisors, with cybersecurity firm CrowdStrike reporting today that ransomware-as-a-service (RaaS) platforms are increasingly being leveraged to deploy Linux versions of ransomware tools. According to the cybersecurity giant, these tools are specifically designed to affect VMware’s ESXi vSphere hypervisor. The company’s research into these kind of attacks date […]

Read More

YubiKey Microsoft Azure CBA

Azure AD CBA on Mobile With Hardware Security Keys Now Available

Microsoft and Yubico partnered to launch the general availability of Azure AD CBA on mobile devices using certificates on YubiKeys.

May 12, 2023 Zachary Comeau Leave a Comment

Microsoft is launching the general availability of Azure AD CBA on iOS and Android devices using certificates on hardware security keys via USB and NFC. According to Microsoft, this allows customers to provision certificates on a hardware security key which can be used for authentication with Azure AD on iOS and Android devices, giving organizations […]

Read More

Spectrum Enterprise, Cisco

Spectrum Enterprise Leverages Cisco Security Tools in New Offerings

Secure Access with Cisco Duo and Cloud Security with Cisco+ Secure Connect will integrate with Spectrum's managed network services portfolio.

May 9, 2023 Zachary Comeau Leave a Comment

Spectrum Enterprise is adding two new security offerings developed through a collaboration with Cisco to its cybersecurity offerings, giving organizations an easy way to provide employees and other stakeholders with safe and secure access to information and applications on networks or private clouds. The new offerings, Secure Access with Cisco Duo and Cloud Security with […]

Read More

Passwordless

Passwordless Tools Are On The Rise, But Adoption Will Take Time

While adoption is slow, passwordless technologies are on the rise and threaten to make World Password Day a thing of the past.

May 5, 2023 Zachary Comeau Leave a Comment

Passwordless technologies have been a big focus of software providers as they are designed to essentially eliminate passwords and a gigantic attack vector. By many metrics, account credentials are the most vulnerable and unsecure part of an organization’s IT infrastructure, with cyberattacks continuing to rely on phishing campaigns and brute force attacks to find their […]

Read More

  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 7
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.