Authentication is an essential step in cybersecurity. In the recent years, passwordless authentication as an authentication method has become critically important as cyber attacks continues to evolve due to various adoption of technologies and practice into the IT infrastructure. The importance of passwordless authentication had also been highlighted by trusted research and advisory firms like
Since the world transitioned to the digital economy in 1995, we use the first consumer e-commerce transaction as a milestone. Everyone knows whatever application security is as strong as your user password, or as weak as the weak password being used. From increasing the lengths, complexity of the password, and frequently changing the password. From
Digital transformation had brought many impacts to the world we are living today. One of the impact is massive utilisation of internet applications in various daily activities and adoption of IT system in organisations. Until today, password authentication remains as the most implemented authentication method for data security and protection in most applications. Recently, as
Among the years, dark web monitoring and how you can monitor it in particular for your own enterprise exposed credentials is one of the key topics. For any digital breach attempt, you can not prevent it. Your enterprise system is as strong as your user ID and password. But if it already exposed credentials, then
2FA Continue to be cost effective and viable for identity protection, as you read the recent news where Google issued a 10k physical USB authentication key for high risk people who use their services. It is also better than doing nothing, as most of the users will prefer to recycle and use the same password