article thumbnail

Passkeys: Using FIDO for Secure and Easy Authentication

Phil Windley

Summary: Passkeys, the popular name for FIDO, are not only easy, they offer better protection against phishing than other forms of multi-factor authentication. She's a security expert and focused many of her remarks on the relative security of different multi-factor authentication (MFA) techniques, a topic I cover in my book as well.

article thumbnail

10 essential tips for bolstering cloud security in your business

CIO Business Intelligence

Multi-Factor Authentication (MFA) : Use an additional layer of authentication, such as a fingerprint or one-time code, to verify user identities. To ensure the security of your cloud applications, infrastructure, and operating systems, it’s important to schedule regular vulnerability scans and penetration tests.

Security 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

DIDComm and the Self-Sovereign Internet

Phil Windley

The exchange of DIDs to form a connection with another party gives both parties a relationship that is self-certifying and mutually authenticated. Alice's agent uses Bob's public key to encrypt the JSON message to ensure only Bob's agent can read it and adds authentication using the private key Alice uses in the Alice:Bob relationship.

article thumbnail

Must-Have Features for a Top-Notch Digital Book Library

Kitaboo

You can save time and money by avoiding physical travel and transportation costs to visit traditional libraries. It should be accessible from any device, such as a computer, tablet, smartphone, or e-reader, and compatible with different operating systems, browsers, and formats.

eBook 78
article thumbnail

Technology Short Take 155

Scott Lowe

Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. Operating Systems/Applications. Viktor van den Berg shares his CKAD exam experience and some tips on how to prepare. The new utility zq claims to be an easier and faster alternative to jq. Programming.

article thumbnail

Technology Short Take 116

Scott Lowe

509v3 digital certificates, how they help enable asymmetric (public/private key) encryption, and the connection to Transport Layer Security (TLS). Lennart Koopmann provides a guide to Yubikey authentication in the real world. Operating Systems/Applications. It provides the basics behind X.509v3

Storage 60
article thumbnail

Naturally Better Security: Leveraging the power of nature to enhance Internet security

CTOvision

Solutions inspired by nature are being applied to diverse fields including energy production, medicine and healthcare, architecture, food production, transportation and manufacturing. The Trusted Security Foundation is key to many operational systems today, including a large deployment protecting the customers of NetDocuments.

Security 150