As the digital phase of survival has both advantages and disadvantages the risks held within the usage of digital products, make us a scape goat in the eyes of cyber criminals. The need to analyse such malicious acts is important for the digital platform to gain its trust among the masses. Thus, setting up Cybersecurity has emerged imperative for the protection of data from the hands of unauthorised actors.

Andrew Shikiar, Chief Marketing Officer and Executive Director of FIDO Alliance, states the need to look beyond cybersecurity training and focus on the authentication methods adopted to defend against hacking attacks. He also elaborates on how these methods go beyond security to provide users with a seamless login experience, a standard that is now expected of all.


More

The Economist: Where are the flaws in two-factor authentication?

The Economist reports that two-factor authentication methods using SMS or OTPs are flawed, and that…

Read More →

PC World: How Intel Core chips could take over two-factor authentication from your phone

Password manager Dashlane is taking advantage of a feature within Intel’s 8th-generation Core chips that…

Read More →

Science Friday Podcast: How To Make Spoof-Proof Biometric Security

On this episode of the Science Friday Podcast, Stephanie Schuckers, director of the Center for…

Read More →