Learn what FIDO is, how it works, and how your organization can benefit from deploying FIDO-based authentication across critical business scenarios.
Read moreMany federal agencies have been using FIDO authenticators to enable secure access to systems for a variety of use cases. However, they have been deployed in varied configurations and there was a lack of guidance on how to implement the credentials. With the release of a new whitepaper, FIDO Alliance Guidance for U.S. Government Agency […]
Read moreWith the recent addition of YubiKeys to officially supported FIDO Level 2 certified devices, ID Austria has taken a significant step towards providing even greater security and convenience for its users. ID Austria, an electronic identification system that builds on the country’s existing mobile phone signature system and the Bürgerkarte (Citizen Card), enables all citizens […]
Read moreWith the proliferation of distributed work globally and as cybercriminals become more sophisticated by the day – it’s clear that traditional passwords and legacy MFA simply aren’t strong enough. Enter WebAuthn, an API that makes it easy for web services to integrate strong authentication into applications using support built in to all leading browsers and […]
Read moreIn 2022, if one thing has been proven, it has been made very clear that not all multi-factor authentication (MFA) is created equal. Vulnerabilities with legacy forms of MFA, such as SMS, TOTPs, and mobile-based apps, continue to be the target and victims of data breaches, with attackers taking aim in record numbers in 2022. […]
Read moreIt doesn’t have to be Cybersecurity Awareness Month to read a flurry of news about human-based phishing attack stories – also called smishing if the “fishing line” is cast via SMS. These attacks boil down to the art of tricking people into revealing personal information and credentials – including usernames, passwords, authentication codes, and sensitive […]
Read moreMicrosoft recently announced the release of three new solutions that enable organizations to deploy Azure Active Directory (Azure AD) to fight phishing attacks in Azure, Office 365, and remote desktop environments. These solutions will be essential to mitigate phishing attacks and will play a key role in supporting organizations looking to comply with the Executive […]
Read moreLegacy multi-factor authentication (MFA) has not worked against modern cyber threats due to inability to stop phishing and other account takeovers. Modern MFA, such as YubiKeys, have been proven to stop phishing attacks and account takeovers in their tracks. Only solutions based on Smart card/PIV or FIDO protocols are truly phishing-resistant according to the National […]
Read moreCome learn key differences between PKI and FIDO, how to deploy FIDO within federal security policies, how to deploy FIDO within federal security policies, and more.
Read moreThere has been a lot of information lately about the new ‘password-killing’ solution, the passkey. As we’ve discussed in previous posts on the topic, passkeys are a new industry term to make existing technology standards approachable to users. Passkeys are discoverable FIDO credentials that enable users to authenticate to websites without a password. Two types […]
Read more