Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Leadership and ManagementSecurity & Business Resilience

5 Minutes With

5 minutes with Bob Burke – The importance of advanced MFA technology

By Joy LePree Anderson
Bob Burke

Bio image courtesy of Bob Burke

March 10, 2023

As cyber criminals continue to improve and advance their methods of attack, organizations and businesses need to keep up. Bob Burke, Vice President of Security and Infrastructure at Beyond Identity, explains why legacy multi-factor authentication (MFA) systems are no longer enough protection and how selecting a modern, current, phishing-resistant MFA allows organizations to better safeguard sensitive information.

Security: What is your background, current role and responsibilities?

Burke: As Vice President of Security and Infrastructure at Beyond Identity, I am responsible for infrastructure, cloud operations and security across all products and business lines. As both a security practitioner and a product architect, my primary mission is to ensure the availability, performance, scalability and security of our internal corporate systems and Software as a Service (SaaS)-based external software offerings. I studied at Pennsylvania State University where I received my Bachelor of Science in Aerospace Engineering and at the University of Michigan where I received my Master of Science in Aerospace Engineering. I first started my career in software development and made my way up to the roles of Director of Engineering and Chief Technology Officer for various tech companies to where I am now as VP of Security and Infrastructure at Beyond Identity.

Security: Does MFA technology help protect organizations and businesses from phishing and other methods of cyberattack? Is it the best technology for this type of security?

Burke: Identity has become enterprises’ largest attack surface, especially as work moves away from the office in favor of a hybrid approach. Even the most rudimentary cyber criminal now has the tools to launch a successful phishing campaign. To effectively address this growing vulnerability, MFA technology has absolutely become the standard for businesses to place another line of defense between threat actors and their own data, applications and networks. But there’s a catch — we’re increasingly seeing a line being drawn in the sand between “good” and “bad” MFA.

Security: You mention “good” and “bad” MFA, what is the distinction?

Burke: MFA technology is only as strong as its weakest factor and, with that in mind, legacy MFA solutions simply cannot keep up with today’s threat landscape. These technologies rely on phishable factors like passwords, one-time codes, push notifications and magic links, all of which can fall into the wrong person’s hands while ultimately adding friction to the user experience. The solution is to remove these vulnerabilities once and for all in favor of phishing-resistant factors like local biometrics or PIN, device-bound passkeys and device security posture checks.

Security: Is there a method that cybersecurity professionals can employ to determine what type of MFA will protect their company’s data and assets?

Burke: Unfortunately, there are a lot of legacy solutions out there that can simply not keep up with the modern threat landscape and, if cybersecurity professionals don’t understand MFA best practices, they’ll select a technology that doesn’t meet their needs.

When selecting their MFA solution, one place cybersecurity professionals should start is by evaluating their compliance with new regulations and security recommendations. In May 2021, following high-profile data breaches at organizations like Solarwinds, Colonial Pipeline and Microsoft Exchange, the U.S. government went as far as to give its federal agencies and contractors 180 days to implement zero trust architecture. Less than a year later, the Office of the Management and Budget (OMB) took this a step further by releasing a memo explicitly calling for federal agencies to adopt phishing-resistant, passwordless MFA. Whether organizations work with the federal government or not, it’s highly recommended that cybersecurity professionals create a comprehensive threat model and understand the relevant organizational risks. This, along with the regulations, will serve as a pulse check for where identity security is heading and will enable security professionals to apply their own strategies when selecting an MFA solution.

Security: Are there other options or is it possible to stack security technologies? Is this cost prohibitive?

Burke: Fundamentally, selecting the proper MFA solution is about minimizing a large threat surface by replacing traditional detection activities with strong prevention through higher levels of authentication assurance. Traditional stacking or defense in depth is just adding significant operational burden with incremental risk reduction. The right passwordless, phishing-resistant MFA should be easily integrated on top of existing technology stacks for rapid deployment and time to value.

The right tool should ultimately save organizations capital by maximizing productivity through frictionless user experiences, reduced help desk calls for password resets and providing the tools to avoid identity-related breaches. These breaches can rack up thousands of dollars in fines, require expensive remediation that pulls security teams away from other mission-critical matters, and can damage reputations. By investing in advanced MFA and preventing these negative outcomes, organizations can actually save dollars down the line.

Security: In a perfect world, what would be the best solution to the problem?

Burke: In a perfect world, identity would be 100% impenetrable and organizations wouldn’t have to give MFA a single thought. Unfortunately, we don’t quite live in that world yet, but organizational leaders can move as many of their security controls as possible from detection to prevention. In doing so, they equip their employees with the best possible tools to work safely in the world we do live in.

By removing phishable factors like passwords from the equation in favor of phishing-resistant MFA, organizations can mitigate some of their greatest vulnerabilities to safeguard their most sensitive information. The ideal authentication solution will establish high trust in both the user identity and the endpoint being used to access resources. Ensuring that endpoints meet device security posture policies is critical to preventing attacks. By incorporating additional risk signals in the authentication equation from tools like endpoint detection and response (EDR), organizations can extend their value by using detection and response signals for enhanced protection.

KEYWORDS: data breach detection endpoint security multifactor authentication phishing threat detection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joy lepree anderson 2023

Joy LePree Anderson is a former Associate Editor of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with

    5 minutes with Matt Voska - The importance of in-office security guards

    See More
  • 5 mins with Soroko

    5 minutes with Jason Soroko - The importance of zero trust during COVID-19

    See More
  • 5 mins with

    5 minutes with Tim Sulzer - The rise of gun violence and physical security technology

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!