Remove Authentication Remove IT Remove Manufacturing Remove Security
article thumbnail

MY TAKE: Businesses gravitate to ‘passwordless’ authentication — widespread consumer use up next

The Last Watchdog

Perhaps not coincidently, it comes at a time when enterprises have begun adopting passwordless authentication systems in mission-critical parts of their internal operations. Excising passwords as the security linchpin to digital services is long, long overdue. Security + efficiency. Here are a few takeaways. Adoption scenarios.

article thumbnail

MY TAKE: New tech standards, like ‘Matter’ and ‘BIMI,’ point the way to secure interoperability

The Last Watchdog

However, there’s still a long way to go to achieve deep interoperability of interconnected services in a way that preserves privacy and is very secure. This is precisely what the consortium of software companies and device manufacturers, led Google, Amazon and Apple, set out to achieve when Matter was conceived four years ago.

Security 276
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to activate multifactor authentication everywhere

Thales Cloud Protection & Licensing

How to activate multifactor authentication everywhere. The impact of not having multifactor authentication (MFA) activated for all users is now well known by enterprises. The challenge of multifactor authentication everywhere. Variety of a user’s authentication journey…. Variety of a user’s authentication journey….

article thumbnail

Accelerating Data Security and Manufacturing Production for Medical Sensors by 20x with nTropy.io and Thales

Thales Cloud Protection & Licensing

Accelerating Data Security and Manufacturing Production for Medical Sensors by 20x with nTropy.io For these reasons, medical device security is a top priority. To protect medical devices with PKI, each device needs to have certain components (certificates, keys) embedded during the manufacturing process.

article thumbnail

A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication

eSecurity Planet

Security researchers recently published a paper detailing an attack they say can be used to bypass smartphone fingerprint authentication. Yiling He of China’s Zhejiang University and Yu Chen of Tencent Security’s Xuanwu Lab are calling the attack BrutePrint , which they say can be used to hijack fingerprint images.

article thumbnail

SHARED INTEL: Coming very soon — ‘passwordless authentication’ as a de facto security practice

The Last Watchdog

As a tradeoff for enjoying our digital lives, we’ve learned to live with password overload and even tolerate two-factor authentication. I had a chance to discuss this seminal transition with George Avetisov, co-founder and chief executive officer of HYPR , a Manhattan-based supplier of advanced authentication technologies.

article thumbnail

Enhance your security posture by detecting risks on authenticator devices

Thales Cloud Protection & Licensing

Enhance your security posture by detecting risks on authenticator devices. This is especially relevant to an organization’s security posture. Not only are mobile devices used as end points to access corporate mail and other enterprise applications, they are also frequently used as authentication devices.