article thumbnail

Authentic leadership: Building an organization that thrives

CIO Business Intelligence

Leadership styles have traditionally centered their focus on profits, share prices, and productivity, but a new approach increasingly taken up by today’s leaders, known as “authentic leadership,” takes a different spin on the concept. But ultimately, authentic leadership can be viewed as the opposite of traditional leadership in many ways.

article thumbnail

Adding Security Keys to Your Authentication Toolbox

SecureWorld News

A quick intro to security keys: A security key can work in place of other forms of two-factor authentication such as receiving a code through SMS or pressing a button in an authentication app. When it came to authenticating, both keys worked just fine. Then, you enter your password and that's that.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco Acquires Duo or How Should You Do 2 factor authentication (2FA)?

Forrester IT

link] From the license cost perspective moving away from SMS for example to Google Authenticator is minimal. NIST has not been recommending SMS OTP 2FA for a while precisely because of SMS inbox takeovers, MITM attacks, etc.

article thumbnail

Architecting Identity: Five Essential Elements of a Modern Customer Authentication Service

CIO Business Intelligence

They may have a built-in user store supporting password authentication, for example. In response to cloud-based customer experiences, more focus has shifted to authentication. Modern authentication systems tend to be built around the FIDO standards of Web Authentication (WebAuthn) and Client-to-Authenticator Protocol (CTAP).

article thumbnail

Managing the whole lifecycle for human and machine authentication

CIO Business Intelligence

In my last column for CIO.com , I outlined some of the cybersecurity issues around user authentication for verification of consumer and business accounts. . FIDO as an industry initiative was set up a decade ago to standardize the need for strong authentication/password technologies. Well, yes, but there is more that tech pros can do.

article thumbnail

Privacy, Authenticity, and Confidentiality

Phil Windley

Summary: Authenticity and privacy are usually traded off against each other. At a recent Utah SSI Meetup , Sam Smith discussed the tradeoff between privacy, authenticity and confidentiality. Authenticity allows parties to a conversation to know to whom they are talking. The following diagram illustrates these tradeoffs.

article thumbnail

Three Ways Banks Can Improve Identity Authentication and Customer Data Privacy

CIO Business Intelligence

As financial services become more digital in nature, it’s important that banks think differently when using data analytics, security tools, and education to improve identity authentication and customer data privacy. Have you thought about what can be done with this device to enhance identity authentication?