Uncategorized

Category

This month is National Cybersecurity Awareness Month. Let me be blunt. If you don’t think you are responsible for cybersecurity – you are wrong. Think about the footsteps you leave in the digital sand, your digital persona, information that you would consider private, valuable and vital. Now, think about how those bits and bytes of...
It is not a surprise to say that passwords are broken. They were not designed to secure today’s connected economy. As an inventor of FIDO standards, we knew that the key to replacing passwords was a privacy-by-design specification that championed interoperability and decentralized the security topography. The Nok Nok™ S3 Suite goes beyond the standards....
It’s been an exciting week as Apple has once again shown its commitment to stronger, standards-based authentication by adding support for Web Authentication Platform Authenticators to iOS, iPadOS, macOS and Safari. With browsers like Safari allowing their users to leverage Face ID or Touch ID based platform authenticators to log in to websites, the final...
As we wrap up another year (and another decade), my thoughts are turning to 2020 and what we need to keep an eye out for next year as we put our plans together. 2019 has been one to remember from big data leaks like last week’sTrueDialogue blunder to groundbreaking new technology like the first-ever standards-based authentication for...
Did you know the Payment Services Directive 2 (PSD2) directive (Directive2015/2366/EU) starts out with 113 introductory recitals?  You can check them out for yourself. It includes such gems as: #29: “‘authentication’ means a procedure which allows the payment service provider to verify the identity of a payment service user or the validity of the use of a...
The Guardian and Forbes reported that researchers traced a massive leakage of 28 Million biometric and personal records to a company whose products are used worldwide for physical access control to a UK based company. The leak included centrally stored fingerprint, facial recognition, photos, unencrypted usernames and passwords, logs of facility access, security levels and clearance and personal...
What if you could authenticate with phishing protection, support dedicated security hardware or security hardware integrated in your users’ everyday devices, allow users to choose PINs, or the biometric modality of their choice – wouldn’t that be great? These were the questions that led us to form an industry alliance (FIDO Alliance) and explore how...
The Economic Times reported Wipro as saying “We detected a potentially abnormal activity in a few employee accounts on our network due to an advanced phishing campaign. Upon learning of the incident, we promptly began an investigation, identified the affected users and took remedial steps to contain and mitigate any potential impact.” From the news so...
From a gaggle of breaches — thousands of major ones a year, at least two or three annually for most organizations — the trade press and analyst circles have rightfully gone into lessons-learned mode. Against that backdrop, I’m hoping my predictions will nudge the discussion forward — to the inflection point where we take those...
The feature provides safeguards against account takeover by prompting the user for confirmation during certain transactions deemed important enough to warrant special care. In such scenarios, a protected security environment displays the confirmation message to the user in such a way as to guarantee that the message hasn’t been corrupted by malicious software. To use...
1 2 3
Translate »