Many of the implemented authentication methods are not phishing-resistant, as the current case shows. One solution here is a FIDO-based authentication solution, which can best be implemented with a hardware-based security key that enables secure MFA by means of hardware tokens and whose MITM protection mechanisms from FIDO also take effect in the event of AiTM attacks.


More

ZDNet: Syncable vs. non-syncable passkeys: Are roaming authenticators the best of both worlds?

Like or not, a replacement for passwords — known as passkeys — is coming your way, if…

Read More →

Intelligent CISO: HID unveils next-generation FIDO hardware and centralised management at scale

HID, a leader in trusted identity and access management solutions, has announced a new line…

Read More →

ZDNet: What if your passkey device is stolen? How to manage risk in our passwordless future

Part of the “passkeys are more secure than passwords” story is derived from the fact that…

Read More →