article thumbnail

On Risk-Based Authentication

Schneier on Security

A Study on Usability and Security Perceptions of Risk-based Authentication “: Abstract : Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-based authentication. I’ve blogged about risk-based authentication before. Paper’s website.

article thumbnail

NCSC Guidance on “Advanced Cryptography”

Schneier on Security

These techniques enable novel applications with different trust relationships between the parties, as compared to traditional cryptographic methods for encryption and authentication. NCSC blog entry. The conclusion: Advanced Cryptography covers a range of techniques for protecting sensitive data at rest, in transit and in use.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: How the FIDO Alliance helps drive the move to passwordless authentication

The Last Watchdog

This traditional authentication method is challenging to get rid of, mostly because it’s so common. And for businesses, transitioning to new authentication solutions can be expensive and time-consuming. It supports standards that make implementing newer, stronger authentication methods possible for businesses.

article thumbnail

GUEST ESSAY: The case for shifting to ‘personal authentication’ as the future of identity

The Last Watchdog

I currently have over 450 accounts that use passwords combined with a variety of two-factor authentication methods. Related: How the Fido Alliance enables password-less authentication. Only a dozen or so of my accounts get authenticated via self-hosted services. Sharing protocols.

article thumbnail

GUEST ESSAY: Why it’s high time for us to rely primarily on passwordless authentication

The Last Watchdog

The next big thing is passwordless authentication. First and foremost, most solutions rely on connected devices like mobile phones to authenticate users. Attackers will continue to find ways to breach our systems, and authentication cryptography will become increasingly vulnerable to attack. Some solutions do this today.

article thumbnail

GUEST ESSAY: ‘Continuous authentication’ is driving passwordless sessions into the mainstream

The Last Watchdog

Much more effective authentication is needed to help protect our digital environment – and make user sessions smoother and much more secure. Underscoring this trend, Uber was recently hacked — through its authentication system. The best possible answer is coming from biometrics-based passwordless, continuous authentication.

article thumbnail

Mail relays – Part 1 | Authenticate your outgoing mail!

Security Boulevard

Email authentication used to be something only big players worried about. In this blog, we explore how authentication can be implemented at the relay level to improve deliverability, prevent abuse, and get ahead. The post Mail relays – Part 1 | Authenticate your outgoing mail! Not anymore.