Is your organization looking to deploy or build a 2FA solution or wanting to check that you're getting the greatest value out of your current 2FA solution?
The Photon Research Team has assessed 2FA and its various implementations, providing you descriptions and demonstrations of practical attacks against 2FA with mitigation techniques. The team looks at:
- Smart cards
- SMS tokens
- Time-based One-Time Passwords
- Universal Second Factor (U2F)
- And more...
Gauge whether you could be doing more to protect your assets online with this latest report.