Op-ed from Ping Identity around the limits of security tokens and the generalization of the use of the smartphone as a security tool. It should be noted that other equipment, such as computers complying with the new FIDO standard and integrating biometric functions such as Windows Hello or Apple TouchID, which are increasingly present on the market, can also be used as trusted devices in a strong authentication solution, in addition to smartphones.


More

Teiss: Security by obscurity keeps us password-dependent

We need security, by community. Andrew Shikiar of the FIDO Alliance calls on more businesses…

Read More →

Financial IT: FIDO Alliance study reveals password usage still dominates financial services – and is proving costly

The FIDO Alliance published its second annual Online Authentication Barometer, which gathers insights into the…

Read More →

Dark Reading: Microsoft’s Certificate-Based Authentication enables phishing resistant MFA

Microsoft has removed a key obstacle facing organizations seeking to deploy phishing-resistant multifactor authentication (MFA)…

Read More →