Badge Makes Device-Independent Authentication Platform Available

Badge Inc. today announced that a namesake platform that enables end users to securely be authenticated on-demand using any device is now generally available.
The company has allied with Okta to provide integration with an identity access management platform.
Dr. Tina Srivastava, co-founder of Badge, said the overall goal is to eliminate any dependency on devices to ensure authentication without having to store credentials.
That approach enables end users to securely access applications without having to be concerned about which device they happen to be using at any given time, she said.
Originally developed by a team of Massachusetts Institute of Technology alumns, the Badge platform eliminates the need for passwords in a way that reduces the level of friction end users experience when required to use multifactor authentication, said Srivastava.
One of the reasons MFA has not been more widely adopted is that existing approaches are tied to devices.
If an end user doesn't have that device or it is lost or stolen, the credentials provided to them have to be reset.
The Badge platform, in contrast, makes use of biometric factors combined with, for example, passive attributes such as physical features or PINs to create an MFA method that doesn't rely on a device or token to authenticate users.
As organizations look to embrace zero-trust IT, many of them are revisiting how they authenticate end users.
Credentials such as passwords are easily stolen via phishing campaigns and other tactics at rates that make existing approaches in authentication obsolete.
There's no doubt that MFA will significantly improve the overall state of cybersecurity, but given the current level of maturity, it is challenging to implement.
The Cybersecurity and Infrastructure Security Agency and the National Security Agency nevertheless recently jointly called for more organizations to adopt MFA and single sign-on capabilities to improve cybersecurity despite challenges the industry needs to address.
Outstanding MFA issues cited include confusing definitions and unclear policy controls spanning different variations of MFA. There is a need for clarity, interoperability and standardization to enable organizations to make comparisons and integrate different solutions based on requirements.
In the absence of that transparency, too many organizations opt for MFA solutions based on, for example, short messaging services.
Other issues include a lack of clarity regarding the security properties that certain MFA implementations provide.
All forms of MFA provide some protection against password reuse and compromise but have differing levels of security for how secret keys are stored and their overall resistance to phishing attacks.
Finally, MFA solutions provide varying levels of support for public key infrastructure and Fast Identity Online2 standards.
Most identity and access management vendors offering SSO platforms support both PKI and FIDO2 authentication, but not all, and it may be incomplete.
Support on different client platforms is also inconsistent and credential life cycle management is often lacking.
One way or another, existing approaches to authentication need to be replaced if cybersecurity teams hope to have a fighting chance to protect IT environments that today are too easily compromised.


This Cyber News was published on securityboulevard.com. Publication date: Wed, 17 Jan 2024 16:43:05 +0000


Cyber News related to Badge Makes Device-Independent Authentication Platform Available

The future of biometrics in a zero trust world - Biometric data obtained from selfies, forged passports and cyberattacks on data stores holding everything from fingerprints to DNA have long been best-sellers on the dark web. Untraceable yet very powerful in allowing attackers to access the most ...
5 months ago Venturebeat.com
Google Workspace Marketplace: 4 Tips for Choosing the Best Apps - An Independent Security Verification badge is one indication that an app should go to the top of your list when evaluating options in the Google Workspace Marketplace. We may be compensated by vendors who appear on this page through methods such as ...
6 months ago Techrepublic.com
Badge Makes Device-Independent Authentication Platform Available - Badge Inc. today announced that a namesake platform that enables end users to securely be authenticated on-demand using any device is now generally available. The company has allied with Okta to provide integration with an identity access management ...
5 months ago Securityboulevard.com
Twitter Changes Verification System: Blue Badge Not Always Blue and Other News - Twitter has recently made several important changes to its tweet verification system. The most noticeable of these is the eye-catching blue badge now given to verified users. However, it isn’t always blue. Other changes have been made, including ...
1 year ago Zdnet.com
Passwordless Login: Effortless Authentication - Let's explore how passwordless login paves the way for seamless and secure user authentication, fostering trust and loyalty. The Password Dilemma Though conventional complex password-based authentication has long been a cornerstone of robust ...
4 months ago Feeds.dzone.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
6 months ago Esecurityplanet.com
What Is Kerberos Authentication?: Implementing Effective Security Protocols - Kerberos is a vital security protocol that any serious computer user must be familiar with. It is an open standard that provides a secure way of verifying the identity of user across multiple systems. The Kerberos authentication protocol is a ...
1 year ago Heimdalsecurity.com
CVE-2022-36407 - Insertion of Sensitive Information into Log File vulnerability in Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500, Hitachi Virtual Storage Platform G1000, G1500, Hitachi Virtual Storage Platform F1500, Hitachi Virtual ...
3 months ago
Is your ID badge giving away too much about you? - ID badges are a two-edged sword, providing security and convenience on one hand, but risking exposure of sensitive data on the other. The reason Abbott's now-removed Insta post caught so much heat is that a hacker named Alex Hope was able to uncover ...
5 months ago Blog.avast.com
How to Use Context-Based Authentication to Improve Security - One of the biggest security weak points for organizations involves their authentication processes. Context-based authentication offers an important tool in the battle against credential stuffing, man-in-the-middle attacks, MFA prompt bombing, and ...
5 months ago Securityboulevard.com
Selecting an Authentication Protocol for Your Business - Authentication protocols serve as the backbone of online security, enabling users to confirm their identities securely and access protected information and services. The protocols exchange information to verify the validity of the authentication ...
2 months ago Darkreading.com
CMDB: Device Visibility for Bank Security - Let us see how a device visibility and control software functions to automatically alert when a rogue or unauthorized device enters your network. Device visibility and control is a cybersecurity concept that refers to the ability to discover, ...
5 months ago Feeds.dzone.com
Trulioo Launches Global Identity Platform for Person and Business Verification - Identity verification firm Trulioo on Tuesday launched a new global identity platform for Person and Business verification. Trulioo so far sold multiple identity products, each operating in their own silos. Their products and services range from ...
1 year ago Csoonline.com
PRODUCT REVIEW: MIXMODE PLATFORM FOR REAL-TIME THREAT DETECTION - Cybersecurity vendor MixMode has redefined the art and science of threat detection and response with its groundbreaking MixMode Platform. At its core, the MixMode Platform relies on a patented foundational model specifically engineered to detect and ...
5 months ago Cybersecurity-insiders.com
Biometric Authentication in Business: Enhancing Security - With its high level of security, convenience, user-friendliness, and accuracy, biometric authentication is paving the way for the future of secure authentication in the business world. One of the primary advantages of implementing biometric ...
5 months ago Securityzap.com
Cybercriminals Exploit X Gold Badge, Selling Compromised Accounts on Dark Web - Organizations could obtain the coveted gold check mark through a monthly subscription. The report reveals that hackers are capitalizing on this feature by selling compromised accounts, complete with the gold verification badge, on dark web ...
5 months ago Cysecurity.news
Strengthen, Unify and Simplify Cybersecurity Tools - Increasingly, security conscious enterprises are turning to platformization to drive better security outcomes and simplify operations. Smartphones, cloud, remote work, and now AI, all bring complexity to information security, yet they must be enabled ...
6 days ago Paloaltonetworks.com
Hello Authentication Vulnerabilities Discovered: Stay Safe - In the realm of cybersecurity, a recent study has brought to light a series of Hello Authentication vulnerabilities that could compromise the Windows Hello authentication on popular laptop models, including Dell Inspiron 15, Lenovo ThinkPad T14, and ...
6 months ago Securityboulevard.com
Stytch offers toolkit for developers to build, implement, and customize passkey-based authentication - Stytch announced its Passkeys offering, giving developers the easiest way to build, customize and maintain passkey-based authentication in their applications. Stytch's new solution offers a flexible, API-first approach to passkeys that abstracts the ...
6 months ago Helpnetsecurity.com
Using the Knowledge Store on Cisco Observability Platform - Cisco Observability Platform enables developers to build custom observability solutions to gain valuable insights across their technology and business stack. While storage and query of Metric, Event, Log, and Trace data is a key platform capability, ...
5 months ago Feedpress.me
Biometric Authentication: Advancements and Challenges - Advancements in technology are driving the world of biometric authentication into a realm where one's very being serves as the key to accessing secure systems. The Evolution of Biometric Technology has significantly transformed the landscape of ...
3 months ago Securityzap.com
Safeguard the joy: 10 tips for securing your shiny new device - The bottom line is that we're all rampant users of smart devices. More than half of Europeans use an internet-connected TV today, a quarter use smartwatches and other wearables, and a fifth are fans of internet-connected gaming devices. With our ...
6 months ago Welivesecurity.com
Omdia: Standalone Security Products Outsell Cybersecurity Platforms - In its many briefings with cybersecurity vendors, one of the most consistent themes Omdia hears is why enterprises need cybersecurity platforms. Instead, vendors claim, enterprises could get better outcomes if they give up their multitude of ...
6 months ago Darkreading.com
Webex announces comprehensive Device Management Capabilities with Phonism integration - Webex is excited to announce a comprehensive solution for 3rd party Device Management referred to as 'Partner Managed Devices. ' Partner Managed Devices allows Webex Cloud Calling offers to support a flexible Device Management strategy. With this ...
6 months ago Feedpress.me
How Cygnvs is Revolutionizing Cyberattack Recovery - Cygnvs, a cutting-edge cybersecurity provider, has recently emerged from stealth mode after introducing their robust cyberattack recovery platform. The platform streamlines things, ensuring teams can respond to incidents and data losses with speed ...
1 year ago Csoonline.com

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)