Op-ed from Ping Identity around the limits of security tokens and the generalization of the use of the smartphone as a security tool. It should be noted that other equipment, such as computers complying with the new FIDO standard and integrating biometric functions such as Windows Hello or Apple TouchID, which are increasingly present on the market, can also be used as trusted devices in a strong authentication solution, in addition to smartphones.


More

ARC Advisory Group: Wireless Broadband Alliance Integrates OpenRoaming with FIDO Device Onboard to Enable Zero-Touch Framework for IoT Device Onboarding

The Wireless Broadband Alliance (WBA), the global industry body dedicated to improving Wi-Fi standards and…

Read More →

Fast Company: Say Goodbye to Passwords

It’s been a couple of years since Apple, Google, and Microsoft started trying to kill…

Read More →

Daily Mail: Top 10 passwords used in the United States revealed – stop using them immediately if they’re yours

Experts discovered the top 10 overused passwords in the US that could put you at…

Read More →