Op-ed from Ping Identity around the limits of security tokens and the generalization of the use of the smartphone as a security tool. It should be noted that other equipment, such as computers complying with the new FIDO standard and integrating biometric functions such as Windows Hello or Apple TouchID, which are increasingly present on the market, can also be used as trusted devices in a strong authentication solution, in addition to smartphones.


More

GIGA: Google Chrome: This important feature is years overdue

Google, Apple and Microsoft want to say goodbye to the principle of passwords altogether. Instead,…

Read More →

Netzpalaver: Phishing-resistant authentication methods

Many of the implemented authentication methods are not phishing-resistant, as the current case shows. One…

Read More →

SC Magazine: Finding FIDO: What Fast Identity Online is, and how it works 

The Fast Identity Online (FIDO) Alliance has a single purpose — to move the digital…

Read More →