Many of the implemented authentication methods are not phishing-resistant, as the current case shows. One solution here is a FIDO-based authentication solution, which can best be implemented with a hardware-based security key that enables secure MFA by means of hardware tokens and whose MITM protection mechanisms from FIDO also take effect in the event of AiTM attacks.


More

Cyberscoop: It’s time to put multi-factor authentication in the NIST Cyber Framework

In this article in Cyberscoop, Executive Director Brett McDowell explains why multi-factor authentication is a…

Read More →

The Paypers: You can now meet PSD2 authentication requirements while improving user experience

In this article in The Paypers, FIDO Alliance Executive Director Brett McDowell explains how FIDO…

Read More →

Harvard Business Review: 8 Ways Governments Can Improve Their Cybersecurity

This article in Harvard Business Review lays out 8 principles that governments around the world…

Read More →