Remove Authentication Remove Hardware Remove Security Remove Transportation
article thumbnail

Passkeys: Using FIDO for Secure and Easy Authentication

Phil Windley

Summary: Passkeys, the popular name for FIDO, are not only easy, they offer better protection against phishing than other forms of multi-factor authentication. She's a security expert and focused many of her remarks on the relative security of different multi-factor authentication (MFA) techniques, a topic I cover in my book as well.

article thumbnail

10 essential tips for bolstering cloud security in your business

CIO Business Intelligence

This makes it more critical than ever to adopt strong security measures to protect sensitive information and infrastructure. However, while cloud computing offers benefits like improved efficiency, scalability, and accessibility, it poses new security challenges.

Security 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Naturally Better Security: Leveraging the power of nature to enhance Internet security

CTOvision

Solutions inspired by nature are being applied to diverse fields including energy production, medicine and healthcare, architecture, food production, transportation and manufacturing. Current approaches are all variants of a security theme from the 1990’s called “Defense in Depth,” where security is layered on at every point in the IT stack.

Security 150
article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

However, many end-users do not recognize their home networks as extensions of their company's security boundaries. They often feel that using a company-provided laptop linked to the corporate security system is sufficient. As a result, they might not take enough measures to secure their other home devices.

Network 85
article thumbnail

The Architecture of Identity Systems

Phil Windley

In Authentic Digital Relationships I made the argument that self-sovereign identity, supporting heterarchical (peer-to-peer) interaction, enables rich digital relationships that allow people to be digitally embodied so they can act online as autonomous agents. This question of power and authority is vital in identity systems.

article thumbnail

Technology Short Take 155

Scott Lowe

Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. Servers/Hardware. Researchers have uncovered a potential security flaw in Apple Silicon CPUs; more details in this 9to5Mac article. Attacks that can affect iPhones when they’re turned off ?

article thumbnail

DIDComm and the Self-Sovereign Internet

Phil Windley

The exchange of DIDs to form a connection with another party gives both parties a relationship that is self-certifying and mutually authenticated. Further, the connection forms a secure messaging channel called DID Communication or DIDComm. Once Bob's agent receives the message, it authenticates that it came from Alice and decrypts it.