Op-ed from Ping Identity around the limits of security tokens and the generalization of the use of the smartphone as a security tool. It should be noted that other equipment, such as computers complying with the new FIDO standard and integrating biometric functions such as Windows Hello or Apple TouchID, which are increasingly present on the market, can also be used as trusted devices in a strong authentication solution, in addition to smartphones.


More

ZD NET: Why the road from passwords to passkeys is long, bumpy, and worth it – probably

Out of the blue, I received a text from my father asking me, “What’s the difference…

Read More →

Forbes: Microsoft’s Password Deletion For 1 Billion Users—Do This Now

Your phone, computer and tablet is now at risk, as the nightmare of AI-powered attacks…

Read More →

Engadget: How to use the Apple Passwords app

Apple’s new Passwords app (introduced with iOS 18, iPadOS 18, and macOS Sequoia) is a big leap…

Read More →