The future of passwords is under the spotlight at present. The discussion to remove and replace them with alternative authentication methods is being addressed in many virtual boardrooms around the world with the need to migrate towards passwordless authentication. As password-related breaches become more common (SolarWinds and Cit0Day) and bigger (COMB), it is becoming more..
No-one could have predicted how 2020 was going to pan out when we welcomed the new year in all those months ago before lockdowns and remote working were part of our daily setup for this year. Many industries have struggled throughout but the technology sector and in particular cybersecurity have never been so busy (well..
July 2019 marked the passing of respected computer pioneer, Fernando Corbato, aged 93, who had a long and illustrious career in technology leaving many great legacies to the field of technology, including 50 years of passwords. Inventor of the password Dr Corbato is perhaps most famous for inventing the password. But this invention was actually..
You used a 2fa setup guide while setting up your Office 365. You’ve got about 5 different passwords, all with different capitals, numbers and symbols in them. You’ve even seen software that requires multi-factor authentication. But, do you need to know what they mean? Or are we now entering the realm of x-factor authentication where..
In our latest article we look at how deviceless authentication can be effective at combating password breaches. For decades now, organisations, platforms and users have relied on passwords for security. The password has been entrusted as the gatekeeper, the single solution to keep information safe and solely in the hands of those with the code..
In his latest video blog, Global Account Manager at Authlogics, Kamber Devjianie, explains why organisations still reliant on hard-tokens as part of their multi-factor authentication strategy need to seriously re-evaluate their usage, in light of the tried and test soft-token alternatives, which can work as part of a 1.5FA, 2FA and 3FA solution. He explains how..
Last week I posted a video explaining Authlogics approach to 1.5FA. This week, I want to talk about 3FA which is an extension of 2FA (something you have and something you know) by the addition of something you are doing that is specific to a task, typically known in the industry as transaction signing.
Way back in December 2012, I met with a journalist in London to introduce the concept of 1.5FA. Roll forward four years and I find myself still having similar conversations. Organisations are desperately looking for a more flexible approach to how they deploy authentication. There are instances where 2FA and 3FA are a requirement (it may be..
How you manage the public fall-out from a cyberattack is in many respects just as important as how it is being dealt with internally. Whist, at the time of writing, the details of the Tesco Bank incident have yet to be revealed, they can be applauded for opening the lines of communication quickly, but is..
In his latest video blog, Kamber Devjianie from Authlogics talks about the multi-factor alternatives available on the market right now, that can enable you to free your customers, clients, employees and IT department from password-based authentication. He explains single-sign-on, the use of biometric readers on smart devices as a method of convenience rather than security and introduces PINgrid a viable alternative to passwords.