According to NIST Special Publication DRAFT 800-63-B4, a phishing-resistant authenticator offers “the ability of the authentication protocol to detect and prevent disclosure of authentication secrets and valid authenticator outputs to an impostor relying party without reliance on the vigilance of the subscriber.” Two examples of phishing-resistant authenticators are PIV cards for US Federal employees and FIDO authenticators paired with W3C’s Web Authentication API for the private sector.


More

Inc.: 6 Expert Tips to Avoid Getting Hacked

In this article in Inc., one of the top ways to avoid getting hacked is…

Read More →

CSO: Vocal theft on the horizon

Executive Director Brett McDowell tells CSO that, while biometrics can be spoofed in some situations,…

Read More →

CIO: How to protect your Google and Facebook accounts with a security key

This CIO story explains how FIDO Authentication is easier to use while providing stronger authentication…

Read More →