With the threat landscape ever-shifting, it is essential to use strong authentication for your protected resources. But what exactly is strong authentication and how does it scale? Blake Hall, Jeffery Frederick, Lorrayne Auld, Sean Frazier