According to NIST Special Publication DRAFT 800-63-B4, a phishing-resistant authenticator offers “the ability of the authentication protocol to detect and prevent disclosure of authentication secrets and valid authenticator outputs to an impostor relying party without reliance on the vigilance of the subscriber.” Two examples of phishing-resistant authenticators are PIV cards for US Federal employees and FIDO authenticators paired with W3C’s Web Authentication API for the private sector.


More

ZDNet: Syncable vs. non-syncable passkeys: Are roaming authenticators the best of both worlds?

Like or not, a replacement for passwords — known as passkeys — is coming your way, if…

Read More →

Intelligent CISO: HID unveils next-generation FIDO hardware and centralised management at scale

HID, a leader in trusted identity and access management solutions, has announced a new line…

Read More →

ZDNet: What if your passkey device is stolen? How to manage risk in our passwordless future

Part of the “passkeys are more secure than passwords” story is derived from the fact that…

Read More →