The 7 technology trends that could replace passwords

In passwords, this provides a secure way to let users prove that they know their own password, without any need to transmit their actual credentials – it is a cryptographic method that proves you know your password without needing to actually submit your credentials. Specops Password Policy integrates with your Active Directory to continuously block a growing database of more than 4 billion compromised passwords, while preventing users from creating weak passwords and scanning for passwords that have been compromised or breached. Passwords will remain a key security element for most orgniazations, with additional authentication methods used to enhance defenses. Unlike standard passwords, which are often short and complex, passphrases consist of multiple words strung together, creating a longer but more memorable authentication method. Many of these techniques have been available for some time, yet passwords remain the foundation of online security, used daily by consumers and businesses across the globe. And there’s plenty more evidence of password vulnerabilities: Verizon’s Data Breach Investigations Report (DBIR) 2024 found that stolen credentials were the top action leading to a breach. Passkeys are resistant to credential stuffing and phishing attacks because the private key used for authentication is securely stored on users' devices and never shared with websites or transmitted over the internet. Our new Specops Breached Password Report found that of one billion stolen credentials, almost a quarter met standard complexity requirements – and still the criminals broke through. These stolen passwords – 230 million of them – met all the requirements of their organization, including more than eight characters, one capital letter, a special character and a number. They key is therefore to ensure your passwords are as robust as possible, no matter what technology you use to enhance your security. Authentication technologies will continue to advance, but you’ll always need to stay on top of your passwords. The optimum approach isn’t to choose between passwords and some other form of security. Biometric authentication uses a person’s physical attributes to confirm their identity: for example, fingerprints, facial recognition, iris scans etc. Security keys are resistant to attacks as they not only require access to the physical device but also the biometrics and PIN required to authenticate the login. Passkeys are phishing-resistant alternatives to passwords that have been growing in popularity over the last couple of years. Instead, we should embrace the advantages of new technologies, while retaining the convenience and security of passwords. The solution is to opt for the best of both worlds by building multi-factor authentication, going beyond two-factor authentication to build in as many layers of security as possible. Many of us have moved beyond passwords alone for online security, and it’s not hard to see why. Security keys are physical devices, usually USB, NFC, or Bluetooth, that are most commonly used for multi-factor authentication (MFA). After entering a password, users tap the security key or enter a PIN to verify their identity, which allows the user to log in to the site or application. And if the system is compromised, you can’t just reset biometric data, like you would a password. However, there remain questions around the possible cost of storing passwords on blockchain ledgers like Bitcoin.

This Cyber News was published on www.bleepingcomputer.com. Publication date: Wed, 26 Mar 2025 15:20:23 +0000


Cyber News related to The 7 technology trends that could replace passwords

Exploring Technology in Classroom Learning - This article aims to explore the effective utilization of technology to enhance classroom learning experiences. Technology plays a crucial role in facilitating effective and engaging learning experiences in the classroom. With the advancement of ...
1 year ago Securityzap.com
Enzoic for AD Lite Data Shows Increase in Crucial Risk Factors - The 2023 data from Enzoic for Active Directory Lite data from 2023 offers a revealing glimpse into the current state of cybersecurity, highlighting a significant increase in risk factors that lead to data breaches. The free password auditor has been ...
1 year ago Securityboulevard.com
The most popular passwords of 2023 are easy to guess and crack - Each year, analysts at various Internet security companies release lists of the most used passwords. ADVERTISEMENT. The passwords that are on these lists may act as a warning for any Internet and electronic device user. Some common passwords have ...
1 year ago Ghacks.net
Unveiling the Power of NFC Technology - Key Components of NFC Technology Tags and Readers NFC technology is based on two essential components: tags and readers. This exchange of information is what enables NFC technology to be used for various applications, such as contactless payments, ...
1 year ago Feeds.dzone.com
The 7 technology trends that could replace passwords - In passwords, this provides a secure way to let users prove that they know their own password, without any need to transmit their actual credentials – it is a cryptographic method that proves you know your password without needing to actually ...
3 days ago Bleepingcomputer.com
Entertainment Transformed: The Impact of Technology - From music production to live events, from television and film to gaming and social media, technology has changed the way we enjoy entertainment in both positive and negative ways. In this article, we will explore how different aspects of ...
1 year ago Securityzap.com
The Future of Business Communications: Trends Shaping the Industry - Keeping up with technology trends, especially focusing on effective business communication with your customers across all platforms, is crucial for your company's success. Trends in 2024 include integrating omnichannel campaign management solutions ...
11 months ago Hackread.com
Smart Home Technology: Your Gateway to Modern Living - Smart home technology offers homeowners an array of benefits, from increased convenience and comfort to enhanced safety and energy savings. Smart home technology offers convenience, comfort, safety, and energy savings. Smart home technology provides ...
1 year ago Securityzap.com Meow
Green Technology Innovations: Sustainable Solutions - Unveil the reality behind green technology innovations by exploring the realm of sustainable solutions. Green technology presents a wide array of sustainable innovations, such as solar panels and wind turbines, offering eco-friendly solutions to our ...
1 year ago Securityzap.com
Sustainable Tech Solutions: Paving the Way for a Greener Tomorrow - In order to ensure a brighter tomorrow, sustainable technology solutions must be embraced and implemented. This article will explore the benefits, challenges, pros and cons of sustainable technologies, as well as showcase various sustainable ...
1 year ago Securityzap.com
Addressing the Cybersecurity Vendor Ecosystem Disconnect - COMMENTARY. If you are a member of the security team in charge of defending a network, you are probably accustomed to working with a technology stack composed of hardware, software, and data from dozens of different sources. Consolidating and joining ...
10 months ago Darkreading.com
Darktrace and Garland Technology Collaborate to Help Businesses Secure Operational Technology Environments - PRESS RELEASE. CAMBRIDGE, England, Jan. 24, 2024 /PRNewswire/ - Darktrace, a global leader in cyber security AI, and Garland Technology, a leading manufacturer of network TAP, aggregator, packet broker, data diode and inline bypass solutions, today ...
1 year ago Darkreading.com
In Pursuit of a Passwordless Future - Many computer users dream of a day when the industry can move past its reliance on passwords to reach a more serene future of frictionless cybersecurity. The fact is that countless remaining devices and systems have been aging and based on password ...
1 year ago Securityboulevard.com
In Pursuit of a Passwordless Future - Many computer users dream of a day when the industry can move past its reliance on passwords to reach a more serene future of frictionless cybersecurity. The fact is, countless remaining devices and systems are aging relics that have been based on ...
1 year ago Cyberdefensemagazine.com
CVE-2024-39496 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
Biodegradable Technology: Sustainable Innovations - Biodegradable technology has a significant impact on our environment, but there is a shocking truth behind its implications. Biodegradable technology has transformed sustainability practices by challenging conventional manufacturing methods and ...
1 year ago Securityzap.com
Protect your Active Directory from these Password-based Vulnerabilities - Deploying a security solution like Specops Password Policy enhances the protection of passwords, which are frequently exploited as an initial entry point by attackers. In this attack, the perpetrator, typically using a compromised low-level account ...
1 year ago Bleepingcomputer.com
Jason's Deli Restaurant Chain Hit by a Credential Stuffing Attack - The personal information of more than 340,000 customers of popular restaurant chain Jason's Deli may have been victims of a credential stuffing attack, a scheme in which the hacker uses stolen or leaked credentials to log into other online accounts. ...
1 year ago Securityboulevard.com
Tech Privacy: Navigating the Age of Digital Surveillance - Users generate and share a significant amount of personal data with third-party companies, highlighting the importance of understanding data ownership and privacy. Technology offers benefits such as data encryption, two-factor authentication, and ...
1 year ago Securityzap.com
What is Proposition E and Why Should San Francisco Voters Oppose It? - In addition to removing certain police oversight authority from the Police Commission and expanding the circumstances under which police may conduct high-speed vehicle chases, Proposition E would also amend existing laws passed in 2019 to protect San ...
1 year ago Eff.org
How to use the Apple Passwords app - Help Net Security - The app’s Security section informs you if you have chosed easily guessable or reused passwords, or if that particular password has been compromised (i.e., appears in public data leaks). To edit passwords, select the “All” section and then ...
5 months ago Helpnetsecurity.com
Most common passwords: 70% can be cracked in less than a second - Racking your brains to come up with a strong password can be a pain. NordPass, the password management tool from the team behind NordVPN, partnered with independent researchers to release its study of the 200 most common passwords used in 2023. Of ...
1 year ago Cnbc.com
Navigating Microsoft's Innovations For 2023: Get Up to Date With The Latest Developments - In the world of digital technology, staying up-to-date with the latest advancements and innovations is becoming increasingly important. As one of the leading technology companies in the world, Microsoft is constantly introducing new innovations in ...
2 years ago Hackread.com
Password Advice for the Rest of Us - Cisco Blogs - The key function you’re wanting out of a password manager is the ability to create passwords that are at least twenty (20) characters long, with all the typical mix of letters, numbers and symbols, as well as the ability to create a unique password ...
5 months ago Feedpress.me
Wearable Tech Future: Where Fashion Meets Function - From fitness trackers and smartwatches to augmented reality glasses, the future of wearable tech is full of potential. In this article, we will explore the current benefits and challenges of wearable technology, uncover its different types and ...
1 year ago Securityzap.com

Latest Cyber News


Cyber Trends (last 7 days)