Replacing traditional MFA with strong, passwordless authentication methods allows security teams to build the first layer of their Zero Trust architecture. Replacing passwords with FIDO-based passkeys that use asymmetric cryptography, and combining them with secure device-based biometrics, creates a phishing-resistant MFA approach.


More

Global Security Mag: Credential Stuffing: Another String to the Hackers’ Arch

Focus on the credential stuffing threat, what it’s about, the risks associated and how to…

Read More →

Computerwoche: Security in the Financial Industry

Banks are a popular target for hackers. Biometric authentication methods could put a stop to…

Read More →

PC Mag UK: How to Protect Your Online Accounts With a Physical Security Key

You can also use the YubiKey as authentication to sign into a variety of websites,…

Read More →