Replacing traditional MFA with strong, passwordless authentication methods allows security teams to build the first layer of their Zero Trust architecture. Replacing passwords with FIDO-based passkeys that use asymmetric cryptography, and combining them with secure device-based biometrics, creates a phishing-resistant MFA approach.


More

The Economist: Where are the flaws in two-factor authentication?

The Economist reports that two-factor authentication methods using SMS or OTPs are flawed, and that…

Read More →

PC World: How Intel Core chips could take over two-factor authentication from your phone

Password manager Dashlane is taking advantage of a feature within Intel’s 8th-generation Core chips that…

Read More →

Science Friday Podcast: How To Make Spoof-Proof Biometric Security

On this episode of the Science Friday Podcast, Stephanie Schuckers, director of the Center for…

Read More →