In Pursuit of a Passwordless Future

Many computer users dream of a day when the industry can move past its reliance on passwords to reach a more serene future of frictionless cybersecurity.
The fact is that countless remaining devices and systems have been aging and based on password security for decades.
There can be no turning back time for such legacy systems-as long as they are in use, we will depend on passwords, at least to some extent.
For most organizations, that means they are stuck in the password-filled present, but that doesn't mean there isn't a passwordless future.
Passwords usually aggravate users due to all the associated friction.
Nobody likes memorizing long strands of letters, numerals and symbols to conduct the simplest business, but weak passwords tend to reward bad actors, which is, of course, the underlying problem.
The trouble is that the safest passwords are typically the hardest to remember, so there is a high amount of friction.
In a world where hackers launch an average of 50 million attacks on passwords every day, which equates to 579 strikes per second, according to Microsoft, safety should override convenience, but that often isn't the case.
Attackers often prey on a user's natural proclivity for convenience when people reuse the same ID and password combination for multiple sites.
Once those passwords and IDs appear on the dark web, they can be used for a range of different logins.
In the short term, we need to bridge the gap between the need for a strong, complex password with the reduction of friction for employees.
Nearly half of all Americans still rely on memory to recall their passwords, meaning that they often adopt simple or repeatable words that are easy to remember.
There is an easy solution that both reduces friction and improves security: Password managers.
Organizations taking security seriously can offer employees a subscription to a password manager, which eliminates the need for employees to remember complex passwords while still providing sufficiently robust credentials.
Organizations should consider using tools that regularly check if passwords are compromised, further ensuring the strength of the passwords used.
These help make the organizations more secure, but also add friction which a passwordless future promises to eliminate.
We have seen many of the biggest tech companies like Apple, Google and Microsoft lead the charge into a passwordless future with the use of biometric recognition or facial recognition.
These approaches can be an effective alternative to passwords as it is much harder to fake someone's fingerprints or face than to guess their password, but it still doesn't solve the problem of all the legacy systems that will be in use for years to come.
The process is slow, but if it is done intentionally, organizations can reduce the number of things passwords are needed for and then the number of people who need to use passwords before finally eliminating them.
The passwordless future feels close because we have the technology to do it, but progress will be slow as applications are migrated to adopt passwordless authentication.


This Cyber News was published on securityboulevard.com. Publication date: Thu, 07 Dec 2023 13:43:04 +0000


Cyber News related to In Pursuit of a Passwordless Future

Passwordless Login: Effortless Authentication - Let's explore how passwordless login paves the way for seamless and secure user authentication, fostering trust and loyalty. The Password Dilemma Though conventional complex password-based authentication has long been a cornerstone of robust ...
9 months ago Feeds.dzone.com
In Pursuit of a Passwordless Future - Many computer users dream of a day when the industry can move past its reliance on passwords to reach a more serene future of frictionless cybersecurity. The fact is that countless remaining devices and systems have been aging and based on password ...
11 months ago Securityboulevard.com
In Pursuit of a Passwordless Future - Many computer users dream of a day when the industry can move past its reliance on passwords to reach a more serene future of frictionless cybersecurity. The fact is, countless remaining devices and systems are aging relics that have been based on ...
9 months ago Cyberdefensemagazine.com
Are organizations moving away from passwords? - Passwordless authentication emerges as a calculated response, eliminating the inherent weaknesses of conventional passwords. At the heart of this evolution lies the deployment of passkeys-sophisticated cryptographic tools designed to authenticate ...
10 months ago Helpnetsecurity.com
12 Software Dev Predictions for Future - Predicting the future of software development trends is always a tough call. Such trends will also rule the future of the software development industry. Analyzing these future software development trends will put enthusiasts ahead of the competition. ...
9 months ago Feeds.dzone.com
Renewable Energy Technology: Powering the Future - Engage in the discussion on how renewable energy technology is set to revolutionize our world and reshape the energy landscape for future generations. From rooftop solar panels to large solar farms, this renewable technology is leading us towards ...
7 months ago Securityzap.com
AWS re:Invent 2023: Passwordless Authentication - I'm here with Graeme Speak, CEO, and founder of BankVault. Graeme, it's such a pleasure to be with you here today. The really big one that we're focused on is called MasterKey, which provides passwordless access to web login portals. Can you explain ...
10 months ago Securityboulevard.com
Most IT Pros Felt Ready for Password-Based Attack; More Than Half Fell Victim - PRESS RELEASE. SANTA CLARA, Calif. - December 12, 2023 - Axiad, a leading provider of organization-wide passwordless orchestration, today announced the results of its 2023 State of Authentication Survey. The survey investigated the types of ...
10 months ago Darkreading.com
How Empathetic Leadership Can Shape the Future of Inclusion in Cybersecurity - Enter empathetic leadership - a style of management that prioritises understanding, compassion, and inclusivity. In this article, we explore how empathetic leadership can shape the future of inclusion in cybersecurity. Empathetic leadership is a ...
5 months ago Cyberdefensemagazine.com
Stress-Testing Security Assumptions in a World of New & Novel Risks - The most devastating security failures often are the ones that we can't imagine - until they happen. Prior to 9/11, national security and law enforcement planners assumed airline hijackers would land the planes in search of a negotiated settlement - ...
4 months ago Darkreading.com
Stytch offers toolkit for developers to build, implement, and customize passkey-based authentication - Stytch announced its Passkeys offering, giving developers the easiest way to build, customize and maintain passkey-based authentication in their applications. Stytch's new solution offers a flexible, API-first approach to passkeys that abstracts the ...
11 months ago Helpnetsecurity.com
Embracing a Passwordless Future: Navigating the Shift to Decentralized Security in 2024 - The world has swiftly embraced digitalization, empowering individuals to accomplish over 90% of their daily tasks through mobile apps or web interfaces. Activities like bill payments, flight bookings, health consultations, and even exploring one's ...
9 months ago Cysecurity.news
Malware Takedowns Show Progress, But Fight Against Cybercrime Not Over - Takedown of malware infrastructure by law enforcement has proven to have an impact, albeit limited, on cybercriminal activity, according to threat intelligence provider Recorded Future. The Emotet takedown, led by Europol and Eurojust in 2021. The ...
9 months ago Infosecurity-magazine.com
Exploring the Phenomenal Rise of Ethereum as a Digital Asset - In this exploration, we delve into the multifaceted layers of Ethereum's meteoric rise, dissecting the technological breakthroughs, the vibrant community dynamics, and the pivotal moments that have propelled it to the forefront of the digital asset ...
8 months ago Hackread.com
Autonomous Vehicles: Driving the Future - The realm of autonomous vehicles presents a fascinating scenario where machines assume control of the wheel, ushering in a new era of transportation. The evolution of autonomous vehicles began quietly in the early days of the automotive industry, ...
7 months ago Securityzap.com
Latest Information Security and Hacking Incidents - We all are no strangers to artificial intelligence expanding over our lives, but Predictive AI stands out as uncharted waters. Unlike its creative counterpart, Generative AI, Predictive AI relies on vast datasets and advanced algorithms to draw ...
5 months ago Cysecurity.news
CVE-2024-29143 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cozmoslabs, sareiodata Passwordless Login passwordless-login allows Stored XSS.This issue affects Passwordless Login: from n/a through ...
7 months ago
CVE-2024-9191 - The Okta Device Access features, provided by the Okta Verify agent for Windows, provides access to the OktaDeviceAccessPipe, which enables attackers in a compromised device to retrieve passwords associated with Desktop MFA passwordless logins. The ...
1 week ago
Top 6 LastPass Alternatives for 2024 - LastPass is a popular choice for managing passwords and sensitive information for individuals and businesses. While the tool still enjoys global patronage, it's not a bad idea to consider other password managers that can serve as worthy alternatives ...
9 months ago Techrepublic.com
Wearable Tech Future: Where Fashion Meets Function - From fitness trackers and smartwatches to augmented reality glasses, the future of wearable tech is full of potential. In this article, we will explore the current benefits and challenges of wearable technology, uncover its different types and ...
11 months ago Securityzap.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
1 month ago Cyberdefensemagazine.com
AI and Quantum Computing Threaten Encryption and Data Security - While only theoretical at this juncture, one of the big concerns about AI, when combined with quantum computing, is that there is a possibility that what is encrypted at present could be decrypted in the future. This is enough of a security concern ...
11 months ago Securityboulevard.com
In the Trenches of Broadband Policy: 2023 Year In Review - Lawmakers recognized this during the pandemic and set in motion once-in-a-generation opportunities to build the future-proof fiber infrastructure needed to close the digital divide once and for all. Monopolistic internet service providers, with ...
10 months ago Eff.org
AI-Powered Russian Network Pushes Fake Political News - Media organizations including Al-Jazeera, Fox News, the BBC, La Croix and TV5Monde are among those impacted. Sometimes legitimate sites are spoofed and hosted on alternative domains such as bbc-uk[. News, while on other occasions, stories are ...
6 months ago Infosecurity-magazine.com
What the Future Holds for Data Security - Data security refers to protective measures used to prevent unauthorized access to sensitive personal and business data. Data security is not just about keeping hackers at bay. It also covers practices like data encryption, data masking, data loss ...
11 months ago Securityboulevard.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)