CISA pushes guide for high-value targets to secure mobile devices

The guide comes as the government continues to deal with the fallout of the Salt Typhoon hack.

The post CISA pushes guide for high-value targets to secure mobile devices appeared first on CyberScoop.

Continue reading CISA pushes guide for high-value targets to secure mobile devices

Is clientDataJson and attestationObject required to verify assertion during authentication in WebAuthN?

Currently I am working on implementing/supporting WebAuthN in my service (JAVA). I have a Control Plane which handles the registration ceremony and Data Plane that handles the authentication ceremony. I am using WebAuthN4J. The persistent … Continue reading Is clientDataJson and attestationObject required to verify assertion during authentication in WebAuthN?

Suggestions for implementing a simplified subset of WebAuthn Relaying Party Operation

Previously some good fellow explained the importance of verifying the public key created and offered by authenticators.
As before, given the complexity of a FULL implementation of RP operation, I believe it’s possible that some aspect may … Continue reading Suggestions for implementing a simplified subset of WebAuthn Relaying Party Operation