IoT devices present danger before, during, and after deployment, and the proliferation of this technology is now a cause for concern from the cybersecurity point of view. Read what Executive Director Andrew Shikiar has to say on security challenges in this contributed piece in Cybersec Asia.


More

Security Boulevard: Beyond Passwords: A Guide to Choosing the Right Passkey

For many market analysts, cybersecurity agencies and authentication experts, passkeys, based on FIDO2 standard protocol,…

Read More →

PC Mag: Lose Your Device, Lose Your Accounts? Not If You Back Up Your Passkeys

Passkeys are more secure than passwords since they’re tied to a device, but what if…

Read More →

Wired: How Passkeys Work—and How to Use Them

Passkeys want to create a password-free future. Here’s what they are and how you can…

Read More →