<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is it time to require two-factor (2FA) authentication on ALL login sessions? in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4591#M486</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1005241419"&gt;@JoePete&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for your comment! I agree that&amp;nbsp;authentication and authorization&amp;nbsp;must be used together to provide a robust combination of secure entry and granular access. I am curious to know your opinion on Zero Trust (ZT) architecture, which takes a radical approach to address both weaknesses, a topic I discuss in &lt;A href="https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4218#M434" target="_self"&gt;another post&lt;/A&gt; on this Forum. Thank you!&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;/P&gt;&lt;P&gt;Aleksandr&lt;/P&gt;</description>
    <pubDate>Wed, 27 Dec 2017 16:08:13 GMT</pubDate>
    <dc:creator>azhuk</dc:creator>
    <dc:date>2017-12-27T16:08:13Z</dc:date>
    <item>
      <title>Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/3999#M388</link>
      <description>&lt;P&gt;Dear Colleagues,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to a recent &lt;EM&gt;InfoSecurity Magazine&lt;/EM&gt; &lt;A href="https://www.infosecurity-magazine.com/news/ftse-100-corporate-logins-found/" target="_blank"&gt;article&lt;/A&gt;, "Over three-quarters (77%) of &lt;A href="https://en.wikipedia.org/wiki/FTSE_100_Index" target="_blank"&gt;FTSE 100 companies&lt;/A&gt; are at risk of suffering a damaging cyber-attack because corporate log-ins including plain text passwords are available on the dark web." Although this might not be news to you, the sobering statistic should be a matter of great concern to all information security professionals. In terms of risk assessment, I think it is only fair to assume that the level of potential exposure of the largest US&amp;nbsp;organizations is likely to be in the&amp;nbsp;same ballpark as that of the European FTSE 100 companies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't think it is feasible to expect that employees will stop reusing their business account passwords on their potentially vulnerable private accounts and devices. Therefore, I wonder if the time has come to enforce two-factor authentication (2FA) on all business login sessions--internal as well as external. What do you think?Thank you very much!&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;/P&gt;&lt;P&gt;Aleksandr Zhuk&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2017 05:26:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/3999#M388</guid>
      <dc:creator>azhuk</dc:creator>
      <dc:date>2017-11-29T05:26:46Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4003#M390</link>
      <description>&lt;P&gt;As long as you can get the technology to work across all business owned devices. When we turned on 2FA we struggled with our mobile devices. We did not have the expertise in mobile device management to ensure that the two factor certs worked on the mobile devices. We also had to have an alternate plan for when people forgot their 2FA badge at their home that was over an hour away. We came up with simple plans to allow for a return to password/user id for people who forgot their badges and we worked on acquiring the expertise for mobile devices.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2017 13:29:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4003#M390</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2017-11-29T13:29:10Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4004#M391</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;SPAN&gt;CISOScott,&amp;nbsp;t&lt;/SPAN&gt;hank you very much for your comment! In your evaluations of an all-inclusive solution, have you come about a product or a set of several integrated products that would provide an alternative 2FA option?&amp;nbsp;For example, a number of consumer products allow to use a 2FA app, such as Google Authenticator, as the preferred 2FA provider, but will also allow to login with an SMS-based code as a backup. Have you considered a similar option for the forgotten 2FA badges? Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2017 14:11:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4004#M391</guid>
      <dc:creator>azhuk</dc:creator>
      <dc:date>2017-11-29T14:11:27Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4005#M392</link>
      <description>&lt;P&gt;Hello Azhuk,&lt;/P&gt;&lt;P&gt;I know what you are looking for is actually possible. In one of my previous roles, the SSO with 2FA provided the choice between PKI card versus Username/Password with sms.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did a very quick search, and SecureAuth might have what you are looking for.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2017 16:18:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4005#M392</guid>
      <dc:creator>AAlves</dc:creator>
      <dc:date>2017-11-29T16:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4007#M393</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;AAlves, thank you very much for your comment and the pointer! I will check out&amp;nbsp;SecureAuth as I&amp;nbsp;am not familiar with this particular 2FA product yet. My underlying question, however, is&amp;nbsp;&lt;EM&gt;why&amp;nbsp;&lt;/EM&gt;&lt;EM&gt;are we as a professional community not recommending "total 2FA" to our business partners?&lt;/EM&gt; There are clearly tools to do this--if not right out of the box, then with a bit of creative integration. There are two obvious immediate benefits of total 2FA coverage:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1. Safer business networks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. Safer jobs for the infosec pros (see recent &lt;A href="https://www.csoonline.com/article/3237797/it-careers/6-missteps-that-could-cost-cisos-their-jobs.html" target="_self"&gt;"6 missteps that could cost CISOs their jobs" &lt;/A&gt;in &lt;EM&gt;CSO Magazine&lt;/EM&gt;).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Sounds like a win-win to me. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Am I missing something? Thank you very much!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2017 16:47:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4007#M393</guid>
      <dc:creator>azhuk</dc:creator>
      <dc:date>2017-11-29T16:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4011#M395</link>
      <description>&lt;P&gt;NIST has withdrawn recommendations for using SMS as a method of delivering 2FA codes. Attackers are capable of intercepting them via attacks against the cellular network through SS7, etc.&amp;nbsp; Additionally, if you're in a secure environment where you can't get have a phone, or can't get a signal, then you're not really going to be able to leverage them anyway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I make heavy use of Yubikey for U2F and HMAC Challenge-Response for authenticating to my laptop and to various online resources even for home use, in addition to using them for OpenPGP Card.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My current employer uses Google Authenticator for various things. Frankly, I'm a fan of having unique tokens that aren't as likely to be the target of general theft than an app on a smartphone, but maybe that's just me.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Nov 2017 02:33:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4011#M395</guid>
      <dc:creator>Badfilemagic</dc:creator>
      <dc:date>2017-11-30T02:33:51Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4022#M401</link>
      <description>&lt;P&gt;I would prefer to see 2FA used in conjunction with a risk based approach.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If behaviour is different then the step up is a second factor. Only put additional security in the way when things are absolutely necessary and have that decision points at different parts of the run time; login, profile update, checkout.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Nov 2017 15:51:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4022#M401</guid>
      <dc:creator>Robert</dc:creator>
      <dc:date>2017-11-30T15:51:12Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4034#M405</link>
      <description>&lt;P&gt;I would prefer to see 2FA used in conjunction with a risk based approach.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If behaviour is different then the step up is a second factor. Only put additional security in the way when things are absolutely necessary and have that decision points at different parts of the run time; login, profile update, checkout.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2017 11:33:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4034#M405</guid>
      <dc:creator>Robert</dc:creator>
      <dc:date>2017-12-01T11:33:15Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4049#M412</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/962379015"&gt;@Robert&lt;/a&gt;, thank you for your comment!&amp;nbsp;The approach you suggest is similar to how CAPTCHA is used today. In case of granting access to business data, however, I am not sure if it will work without really sophisticated analytics integrated in authentication process.&amp;nbsp; After all, if a user's password has been compromised, the attacker will need only one try to gain access. Unless there is some on-the-spot intelligence in place that runs through a comprehensive rules set, before granting access (e.g. the password needs to be right AND the incoming login is not from any suspicious IPs AND the login request comes within the normal patterns of behavior for the user, etc.), then the attack will succeed. Further, since any intelligent pattern-based filter will come with its own false-positive rate of flagging/impeding a legitimate login request, it seems that having a clear-cut yes/no 2FA check be robust enough as a control and will provide the most accurate results. Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2017 15:33:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4049#M412</guid>
      <dc:creator>azhuk</dc:creator>
      <dc:date>2017-12-01T15:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4110#M423</link>
      <description>&lt;P&gt;CAPTCHA is a check to prevent robotic registration or login I don't see it having a role as a risk decision point for authentication.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are a number of products in the&amp;nbsp; market already supporting rules based approaches and a number of community device intelligence and IP address intelligence information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Continually presenting a 2FA token especially on a portal login for B2C will drive customers away.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2017 21:24:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4110#M423</guid>
      <dc:creator>Robert</dc:creator>
      <dc:date>2017-12-04T21:24:13Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4111#M424</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/962379015"&gt;@Robert&lt;/a&gt;, you are right about the use of CAPTCHA. The parallel I was drawing is between how CAPTCHA is able to dial up its complexity if certain thresholds are met to question the humanity of the party interacting with it. In your earlier comment, you mentioned a similar logic--presenting 2FA in certain cases only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Second, while I completely agree that 2FA requirement for B2C interactions may indeed drive away the customers that favor ease over enhanced security, enforcing 2FA use for all interactive authentication requests of&amp;nbsp;internal users (e.g. employees, contractors, etc.) will hardly push people to quit their jobs. Thanks much!&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2017 21:42:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4111#M424</guid>
      <dc:creator>azhuk</dc:creator>
      <dc:date>2017-12-04T21:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4590#M485</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/60764811"&gt;@azhuk&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't think it is feasible to expect that employees will stop reusing their business account passwords on their potentially vulnerable private accounts and devices. Therefore, I wonder if the time has come to enforce two-factor authentication (2FA) on all business login sessions&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Password-based authentication works&amp;nbsp;because it is cheap, easy and reliable. Add a second factor, and you have to confront significant issues on all three of those attributes. I think we tend to focus on the wrong issue with these data breaches. It's&amp;nbsp;not&amp;nbsp;about the weakness of authentication/passwords, but the unnecessary privileges assigned to users (or the opportunity to escalate those privileges). In other terms, we put so much effort into authentication, we tend to ignore authorization.&amp;nbsp;We tend to treat corporate networks like warehouses. Everyone has a set of keys, once inside the door, it is just one big place for us all to roam. Instead, we need more compartmentalization. And yes, in the most sensitive areas, implement two-factor authentication, but to require it organization-wide will end up being too cumbersome at this point in time.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2017 15:40:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4590#M485</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2017-12-27T15:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4591#M486</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1005241419"&gt;@JoePete&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for your comment! I agree that&amp;nbsp;authentication and authorization&amp;nbsp;must be used together to provide a robust combination of secure entry and granular access. I am curious to know your opinion on Zero Trust (ZT) architecture, which takes a radical approach to address both weaknesses, a topic I discuss in &lt;A href="https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4218#M434" target="_self"&gt;another post&lt;/A&gt; on this Forum. Thank you!&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;/P&gt;&lt;P&gt;Aleksandr&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2017 16:08:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4591#M486</guid>
      <dc:creator>azhuk</dc:creator>
      <dc:date>2017-12-27T16:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4594#M487</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/60764811"&gt;@azhuk&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;I agree that&amp;nbsp;authentication and authorization&amp;nbsp;must be used together to provide a robust combination of secure entry and granular access. I am curious to know your opinion on Zero Trust (ZT) architecture, which takes a radical approach to address both weaknesses, a topic I discuss in &lt;A href="https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4218#M434" target="_self"&gt;another post&lt;/A&gt; on this Forum.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/60764811"&gt;@azhuk&lt;/a&gt;&amp;nbsp;I haven't spent much time with Zero Trust. On the surface, it seems like an iteration of "least privilege." The reality from a security standpoint is that we are always trying to apply structure to things that lack structure. That is the organizational challenge/gap. We who deal with information systems demand structure because our systems do. But those who manage our organizations often don't have a full road map for what they are doing. Hence, if we want to implement something like least privilege (or perhaps zero trust) in a typical organization, it tends to impede business objectives, which evolve almost instantly.&amp;nbsp;The more&amp;nbsp;structured - sometimes inflexible - organizations&amp;nbsp;are, the easier it is to implement things like least privilege (think military). It also stands that&amp;nbsp;the lack of structure, need for flexibility, and responsiveness are vary&amp;nbsp;inline.&amp;nbsp;In short, the evolving organization who needs flexibility also needs it now. That is where we get into the Tootsie Pop strategy of once you are inside the network&amp;nbsp;as any employee (i.e. get past the hard outer shell) everything is soft and chewy. As much as our systems can provide a more layered, granular approach, that&amp;nbsp;level of thinking is not part of the typical business model.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2017 16:44:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4594#M487</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2017-12-27T16:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4600#M488</link>
      <description>&lt;P&gt;Full disclosure; I am a technical consultant in the advanced authentication domain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Global sales, and technical advances e.g. biometrics and context-based authentication, are currently moving at a ferocious pace from my experience in the field.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regulatory requirements are about to shift to demand 2FA for remote access is expanded to all user sessions. Therefore, those organisations bound by such regulations will definitely move to 2FA for internal users. The question is not "if" but simply a matter of "when" for these organisations. For example, this becomes a mandatory requirement in February for PCI DSS. Other regulatory bodies will follow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Those organisations without a regulatory focus will adopt a cost-based approach. Software authenticators allow an agile approach with a lower cost of ownership.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Those that already have mobile-device management can further minimize risk by managing these processes centrally. However, smaller businesses, or those with budgetary constraints, often choose to leverage a BYOD model. This can minimize costs but would be less secure than hardware tokens.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2017 12:48:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4600#M488</guid>
      <dc:creator>sdurbin</dc:creator>
      <dc:date>2017-12-28T12:48:16Z</dc:date>
    </item>
    <item>
      <title>Re: Is it time to require two-factor (2FA) authentication on ALL login sessions?</title>
      <link>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4786#M522</link>
      <description>&lt;P&gt;Its a good security measure.&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jan 2018 10:54:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Is-it-time-to-require-two-factor-2FA-authentication-on-ALL-login/m-p/4786#M522</guid>
      <dc:creator>Bayshob</dc:creator>
      <dc:date>2018-01-06T10:54:49Z</dc:date>
    </item>
  </channel>
</rss>

