My recent feature on passkeys attracted significant interest, and a number of the 1,100-plus comments raised questions about how the passkey system actually works and if it can be trusted. In response, I’ve put together this list of frequently asked questions to dispel a few myths and shed some light on what we know—and don’t know—about passkeys. This FAQ will be updated from time to time to answer additional questions of merit, so check back regularly. This author will not be monitoring or responding to comments going forward but can still be contacted through email.


More

Help Net Security: The fundamentals of network security and cybersecurity hygiene

This article by Help Net Security reports that FIDO Security Keys can greatly help organizations…

Read More →

Information Management: Three steps toward stronger data protection

The FIDO Alliance has worked to create one of the strongest authentication protocols in the…

Read More →

CSO: 9 cyber security predictions for 2019

In this CSO article, the staff predicts that FIDO2 browser enhancements will help enable multifactor…

Read More →