Op-ed from Ping Identity around the limits of security tokens and the generalization of the use of the smartphone as a security tool. It should be noted that other equipment, such as computers complying with the new FIDO standard and integrating biometric functions such as Windows Hello or Apple TouchID, which are increasingly present on the market, can also be used as trusted devices in a strong authentication solution, in addition to smartphones.


More

AWS: AWS IAM now supports WebAuthn and Safari browser for multi-factor authentication with security keys

AWS Identity and Access Management (IAM) now supports the Web Authentication (WebAuthn) standard for strong and…

Read More →

Dark Reading: Biometric Data Offers Added Security — But Don’t Lose Sight of These Important Risks

With rising fraud, businesses are seeking authentication methods that are security- and user-friendly. But with…

Read More →

CIO: Stop Thinking Small: 100% of Your Customers Can Go Passwordless

Passwords have reached end of life. Is your organization prepared for passwordless authentication? Here’s how…

Read More →