Making the Leap: The Risks and Benefits of Passwordless Authentication

The password isn’t going anywhere. Passwordless authentication is gaining momentum, though. It appears to be winning the battle of how companies are choosing to log in. Like it or not, the security industry must contend with both in the future.  But for some businesses and agencies, going passwordless is the clear strategy. Microsoft, for instance, […]

The post Making the Leap: The Risks and Benefits of Passwordless Authentication appeared first on Security Intelligence.

Continue reading Making the Leap: The Risks and Benefits of Passwordless Authentication

Overcoming the roadblocks to passwordless authentication

It’s a well-known fact that humans are the weakest link in any security strategy. Verizon’s latest annual data breach report found that over 80% of breaches in the “Basic Web Application Attacks” incident pattern were due to stolen credentials. Not sur… Continue reading Overcoming the roadblocks to passwordless authentication

What are the benefits of passwordless authentication?

In this video for Help Net Security, Christofer Hoff, Chief Secure Technology Officer at LastPass, talks about the benefits of passwordless authentication. The basic components needed to make passwordless authentication a reality are: An open, standard… Continue reading What are the benefits of passwordless authentication?

The future is passwordless. What’s slowing it down?

Ping Identity and Yubico surveyed IT leaders across the globe to determine their appetite for passwordless solutions. Overwhelmingly, the desire was clear to adopt more secure and convenient methods of passwordless authentication. They cited gains in s… Continue reading The future is passwordless. What’s slowing it down?

Apple unveils passkeys for passwordless authentication to apps and websites

At WWDC 2022, Apple has announced and previewed iOS 16 and iPad OS 16, macOS 13 (aka macOS Ventura), watchOS 9, their new M2 chips, new MacBook Air and Pro, as well as new tools, technologies, and APIs for developers focusing on Apple’s platforms… Continue reading Apple unveils passkeys for passwordless authentication to apps and websites

The 6 steps to a successful cyber defense

The Ransomware Spotlight Year-End Report from Ivanti, conducted in partnership with Cyber Security Works and Cyware, found that there is now a total of 157 ransomware families – an increase of 32 from the previous year. Targeting unpatched vulner… Continue reading The 6 steps to a successful cyber defense

Good end user passwords begin with a well-enforced password policy

In this interview with Help Net Security, Lori Österholm, CTO at Specops Software, explains what makes passwords vulnerable and suggests some password best practices and policies organizations should implement to keep their systems secure. There’… Continue reading Good end user passwords begin with a well-enforced password policy

Why low-code and identity must co-exist

Software development has emerged as a critical task for organizations looking to compete in the digital economy. It increasingly fuels innovation and even disruption. Yet, building, testing, and verifying major chunks of code usually takes months &#821… Continue reading Why low-code and identity must co-exist

The challenge of planning an IAM strategy for multi-cloud environments to avoid risk

According to the Strata Identity and Forrester study, 78% of IT decision-makers said managing user identities between multiple clouds is the number one challenge. The study found that the top driver for migrating to the cloud is the need to increase se… Continue reading The challenge of planning an IAM strategy for multi-cloud environments to avoid risk