Op-ed from Ping Identity around the limits of security tokens and the generalization of the use of the smartphone as a security tool. It should be noted that other equipment, such as computers complying with the new FIDO standard and integrating biometric functions such as Windows Hello or Apple TouchID, which are increasingly present on the market, can also be used as trusted devices in a strong authentication solution, in addition to smartphones.


More

The Verge: When can we finally get rid of passwords?

The Verge reports that passwords, and all the risks that come with them, could be…

Read More →

ZDNet: Google transforms Android phones into security keys

At the Google Cloud Next conference, Google showcased the next step it’s taking to get…

Read More →

Venture Beat: You can now use your Android phone as a 2FA security key for Google accounts

Venture Beat reports on Google’s announcement that phones running Android 7.0 Nougat and higher can…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.