We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Back to Insights

Most Popular 2nd Factor Authentication Methods

January 8, 2018 | Key Technologies

Unsurprisingly, all respondents rely on passwords to authenticate users of some business functions. The next most common authentication method, however, is static security questions (26 percent of organizations reported using this type of authentication). Together with a password, this still represents relatively weak authentication.



Please Login to continue

Related Research

12/10/2018 | Content Aggregator
Blockchain: Overview of Adoption Concerns

11/28/2018 | Content Aggregator
59% of Organizations Say Artificial Intelligence Reduces Application Security Risk

11/5/2018 | Content Aggregator
Artificial Intelligence: How It Supports Cybersecurity

11/1/2018 | Content Aggregator
Artificial Intelligence: Top Governance Challenges to Deployment