article thumbnail

Google, Apple, Microsoft promise end to passwords, courtesy of your mobile phone

Tech Republic Security

Adopting a new authentication method from the FIDO Alliance, the three major OS vendors will let you use encrypted credentials stored on your phone to automatically sign you into your online accounts. The post Google, Apple, Microsoft promise end to passwords, courtesy of your mobile phone appeared first on TechRepublic.

Mobile 145
article thumbnail

Architecting Identity: Five Essential Elements of a Modern Customer Authentication Service

CIO Business Intelligence

They may have a built-in user store supporting password authentication, for example. In response to cloud-based customer experiences, more focus has shifted to authentication. Modern authentication systems tend to be built around the FIDO standards of Web Authentication (WebAuthn) and Client-to-Authenticator Protocol (CTAP).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Frucor Suntory amplifies sales and service with a unified mobile app

CIO Business Intelligence

Early in my career, I stayed in an authentic ryokan inn in Kyoto. Unifying four siloed sales tools into one iOS mobile app for easy access to data Frucor Suntory’s outdated on-premises custom sales automation system scattered information across multiple tabs and locations.

Mobile 114
article thumbnail

The cyber pandemic: AI deepfakes and the future of security and identity verification

CIO Business Intelligence

In fact, Gartner estimates that by 2026, nearly one-third of enterprises will consider identity verification and authentication solutions unreliable due to AI-generated deepfakes. And the only way to do this is to leverage advanced security technologies such as mobile cryptography.

Security 111
article thumbnail

TSB customers can use their faces to authenticate payments

Computer Weekly

Bank’s latest addition to its mobile apps is a facial recognition option for Apple iPhone X users

article thumbnail

Application List Report

Mick's IT Blog

Here is an example of my ARPExclusions.txt file: 64 Bit HP CIO Components Installer Active Directory Authentication Library for SQL Server Active Directory Authentication Library for SQL Server (x86) Administrative Templates (.admx)

article thumbnail

Passwordless MFA for Customers: How to Fortify Security without Introducing Friction

CIO Business Intelligence

Password-based authentication is likely the most widely used method of authenticating users to online services. Password-based authentication is used because it is easy to understand and implement. They provide multifactor authentication (MFA) without the usual burden on the user. on a user’s other online accounts.