According to NIST Special Publication DRAFT 800-63-B4, a phishing-resistant authenticator offers “the ability of the authentication protocol to detect and prevent disclosure of authentication secrets and valid authenticator outputs to an impostor relying party without reliance on the vigilance of the subscriber.” Two examples of phishing-resistant authenticators are PIV cards for US Federal employees and FIDO authenticators paired with W3C’s Web Authentication API for the private sector.


More

The New York Times: The Tech That Our Security Experts Use to Be Digitally Secure

Security experts from the New York Times explain why they use FIDO security keys for…

Read More →

CSO: Two years after the OPM data breach: What government agencies must do now

In this look back at the OPM data breach, Jeremy Grant of Venable and FIDO’s…

Read More →

mHealth Intelligence: Can Behaviors Replace the Password on Mobile Health Devices?

mHealth Intelligence reports on a FIDO Alliance webinar featuring Aetna, who spoke on modern authentication…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.