Op-ed from Ping Identity around the limits of security tokens and the generalization of the use of the smartphone as a security tool. It should be noted that other equipment, such as computers complying with the new FIDO standard and integrating biometric functions such as Windows Hello or Apple TouchID, which are increasingly present on the market, can also be used as trusted devices in a strong authentication solution, in addition to smartphones.


More

GB News: Microsoft will start DELETING your passwords from today, and there’s only one way to save them

Microsoft has started to delete all passwords saved in its Authenticator app — and if you want…

Read More →

ZDNet: Syncable vs. non-syncable passkeys: Are roaming authenticators the best of both worlds?

Like or not, a replacement for passwords — known as passkeys — is coming your way, if…

Read More →

Intelligent CISO: HID unveils next-generation FIDO hardware and centralised management at scale

HID, a leader in trusted identity and access management solutions, has announced a new line…

Read More →