article thumbnail

Passkeys: Using FIDO for Secure and Easy Authentication

Phil Windley

Summary: Passkeys, the popular name for FIDO, are not only easy, they offer better protection against phishing than other forms of multi-factor authentication. She's a security expert and focused many of her remarks on the relative security of different multi-factor authentication (MFA) techniques, a topic I cover in my book as well.

article thumbnail

Apple WWDC 2020: iOS 14, ARM Macs, hardware rumors, and what else to expect

The Verge

The show must go on, so Apple will be presenting the entire conference in a new, digital-only format. The company is still expected to unveil the first look at the future of iOS, macOS, watchOS, and tvOS — the various suites of software that power all of Apple’s hardware. The first look at the next generation of Apple’s software.

Hardware 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tech leaders discuss generative AI’s impact on enterprise, startups and society

GeekWire

Presenters at Google’s I/O keynote on Wednesday said the word “AI” more than 140 times. ” Moses said these conversations happen frequently, as leaders are concerned about authentication and attribution as it relates to AI-generated content.

article thumbnail

Wallets and Agents

Phil Windley

Key management is performed in cooperation with the operating system and underlying hardware. Ideally, the operating system and hardware provide a secure enclave for key storage and a trusted execution environment for performing key-management functions. The agent also presents and verifies credentials.

article thumbnail

Is AI in the enterprise ready for primetime? Not yet.

CIO Business Intelligence

AI hallucinations The problem of AI hallucinations, where a large language model (LLM) presents authentic-looking but made-up results, shouldn’t be underestimated for enterprise AI deployments. Workflows, user-training and technological path-dependency act as brakes on the deployment of new hardware and software solutions.

article thumbnail

API security: key to interoperability or key to an organization?

CIO Business Intelligence

APIs enable organizations to bring innovative applications and functionality to customers at an increasingly fast pace and also serve as applications for provisioning cloud platforms, hardware, and software, acting as service gateways to enable indirect and direct cloud services.

article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

After a series of introductions from the audience, Garcia commenced his presentation. Authentication is addressed for the perimeter security requirements. Active Directory and Kerberos are the authentication staples within the enterprise, allowing all users to be authenticated. Learn More about Cloudera here.

Big Data 150