According to NIST Special Publication DRAFT 800-63-B4, a phishing-resistant authenticator offers “the ability of the authentication protocol to detect and prevent disclosure of authentication secrets and valid authenticator outputs to an impostor relying party without reliance on the vigilance of the subscriber.” Two examples of phishing-resistant authenticators are PIV cards for US Federal employees and FIDO authenticators paired with W3C’s Web Authentication API for the private sector.


More

ARS Technica: Thousands of sensitive emails stolen in intrusion of Republican campaign arm

In response to the email hack on the National Republican congressional Committee, this article by…

Read More →

Help Net Security: The fundamentals of network security and cybersecurity hygiene

This article by Help Net Security reports that FIDO Security Keys can greatly help organizations…

Read More →

Information Management: Three steps toward stronger data protection

The FIDO Alliance has worked to create one of the strongest authentication protocols in the…

Read More →