The protection of sensitive company networks and critical infrastructures is increasingly in focus, also in view of a tense security situation. In many cases, cyber security concepts currently in use are being put to the test.


More

Netzpalaver: Phishing-resistant authentication methods

Many of the implemented authentication methods are not phishing-resistant, as the current case shows. One…

Read More →

SC Magazine: Finding FIDO: What Fast Identity Online is, and how it works 

The Fast Identity Online (FIDO) Alliance has a single purpose — to move the digital…

Read More →

Wall Street Journal: How to pass on your passwords when you die

Apple, Google and Meta Platforms are among the tech companies that provide digital-legacy tools to…

Read More →