Op-ed from Ping Identity around the limits of security tokens and the generalization of the use of the smartphone as a security tool. It should be noted that other equipment, such as computers complying with the new FIDO standard and integrating biometric functions such as Windows Hello or Apple TouchID, which are increasingly present on the market, can also be used as trusted devices in a strong authentication solution, in addition to smartphones.


More

The Associated Press: One Tech Tip: Replacing passwords with passkeys for an easier login experience

You might have noticed that many online services are now offering the option of using…

Read More →

Biometric Update: Mastercard replacement of OTPs with passkeys and Click to Pay reaches APAC

Mastercard is enabling faster and more convenient online transactions with its newest feature, Mastercard Click to…

Read More →

The Record: These major software firms took CISA’s secure-by-design pledge. Here’s how they’re implementing it

The Cybersecurity and Infrastructure Security Agency’s (CISA) secure-by-design pledge has hit its six-month mark, and…

Read More →