July 6, 2023

B2B Cyber Security: Best practices for zero trust

Replacing traditional MFA with strong, passwordless authentication methods allows security teams to build the first layer of their Zero Trust architecture. Replacing passwords with FIDO-based passkeys that use asymmetric cryptography, and combining them with secure device-based biometrics, creates a phishing-resistant MFA approach. 

MORE FIDO in the News


Bleeping Computer: Okta – Hackers target IT help desks to gain Super Admin, disable MFA

Identity and access management company Okta released a warning about...

September 12, 2023

Security Magazine: Embracing a company culture of cybersecurity starts at the top

Andrew’s byline where he discusses how cybersecurity needs to be...


Forbes: Cyber Autumn: Captivating Cybersecurity Conferences to Dive Into This October 2023

Authenticate 2023 is the go-to event for everything related to...

September 1, 2023

The Verge: X Wants Permission to Start Collecting Your Biometric Data and Employment History

X Wants Permission to Start Collecting Your Biometric Data and...