Op-ed from Ping Identity around the limits of security tokens and the generalization of the use of the smartphone as a security tool. It should be noted that other equipment, such as computers complying with the new FIDO standard and integrating biometric functions such as Windows Hello or Apple TouchID, which are increasingly present on the market, can also be used as trusted devices in a strong authentication solution, in addition to smartphones.


More

Dark Reading: NIST Digital Identity Guidelines Evolve with Threat Landscape

In a bid to improve overall security of the identity ecosystem, the National Institute of…

Read More →

Research Snipers: Microsoft Authenticator Deletes All Stored Passwords, Pushes Users Toward Passkeys

As announced, Microsoft today deletes all stored passwords from his authenticator app. Users have to…

Read More →

Security.World: HID Unveils Next-Generation FIDO Hardware And Centralized Management At Scale

HID, a worldwide leader in trusted identity and access management solutions, has announced a new line of FIDO-certified credentials—now powered…

Read More →


123286 Next