article thumbnail

Passkeys: Using FIDO for Secure and Easy Authentication

Phil Windley

Summary: Passkeys, the popular name for FIDO, are not only easy, they offer better protection against phishing than other forms of multi-factor authentication. She's a security expert and focused many of her remarks on the relative security of different multi-factor authentication (MFA) techniques, a topic I cover in my book as well.

article thumbnail

The High-Stakes Game of Ensuring IoMT Device Security

SecureWorld News

New security solutions are now aiding healthcare organizations' IT teams in promptly resolving issues, even with devices from various manufacturers. Let's examine common security challenges in connected healthcare equipment and discuss some effective protection strategies and recommendations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Trusted Cyber Collaboration Workshop: A gathering of the leaders in secure collaboration and cyber security 24-26 Sep in DC

CTOvision

This gathering, facilitated by the Transglobal Secure Collaboration Participation (TSCP) pulls together leaders in real secure information exchange, including information exchange across and between enterprises. Join the Leaders in Secure Collaboration. Presentations By and For the TSCP Community and Industry.

Security 258
article thumbnail

Top 5 Security Trends for CIOs

CIO Business Intelligence

Keeping up–and hopefully, staying ahead–presents new challenges. Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. In reality, generative AI presents a number of new and transformed risks to the organization.

Trends 126
article thumbnail

What is Zero Trust Network Architecture (ZTNA)?

Network World

Everything must be authenticated, authorized, verified and continuously monitored. The traditional approach to security was based on the concept of “trust, but verify.” A Zero Trust architecture doesn’t aim to make a system trusted or secure, but rather to eliminate the concept of trust altogether.

article thumbnail

Why ‘deepfake geography’ presents significant risks — and how researchers are detecting it

GeekWire

Techniques such as “location spoofing” and deepfake geography present significant risks for our increasingly connected society. Though such deepfakes may sound futuristic, in fact they already exist and are a growing concern for national security officials. Half of these were authentic images of the three cities. and Beijing.

Research 133
article thumbnail

Digital Experience and Security: Turning Unhappy Paths into Happy Paths for Your Customers

CIO Business Intelligence

User authentication is often an “unhappy path”. UX professionals should be aware of the security fatigue that plagues many users. But they should also be aware of the impact of security on happy and unhappy paths. Do your security measures leave your customers unprotected? Making authentication a “happy path”.