According to NIST Special Publication DRAFT 800-63-B4, a phishing-resistant authenticator offers “the ability of the authentication protocol to detect and prevent disclosure of authentication secrets and valid authenticator outputs to an impostor relying party without reliance on the vigilance of the subscriber.” Two examples of phishing-resistant authenticators are PIV cards for US Federal employees and FIDO authenticators paired with W3C’s Web Authentication API for the private sector.


More

Huffington Post: Ask The Thought Leaders: What’s The Future of Cybersecurity?

This Huffington Post article says FIDO Authentication is the future for “all logins that contain…

Read More →

Inc.: 6 Expert Tips to Avoid Getting Hacked

In this article in Inc., one of the top ways to avoid getting hacked is…

Read More →

CSO: Vocal theft on the horizon

Executive Director Brett McDowell tells CSO that, while biometrics can be spoofed in some situations,…

Read More →