The case for strong authentication

Reports that a security researcher has discovered a criminal database containing access details for 200,000 servers worldwide demonstrates yet again the need for strong authentication, based on more than shared secrets, for all remote access.  

We should all be working on the assumption that any secret information might at some point be compromised. That’s the nature of the information age. It’s getting harder and harder to keep secrets and to safeguard private infrastructure. We can hope for best, but we should always plan for the worst.  

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close