Say Goodbye to Passwords in 2018

Passwords. They’ve always been an ongoing IT issue, but that subject is becoming exceptionally serious as organizations strive to support a rapidly growing mobile workforce using ever-increasing numbers of devices, and consuming more and more applications from external cloud platforms. Passwords are:

  • Easily forgotten and easy to guess.
  • Used across multiple devices and locations resulting in an expanded attack surface.
  • A significant expense and drain on IT resources.
  • Difficult to enter on mobile devices.
Topics: Cybersecurity multi-factor authentication Enterprise Mobility Fast Identity Online Alliance

Take-aways from RSA

As expected, the 2016 RSA Conference was bigger than ever—more attendees, presentations, exhibitors, etc. Since I live in the cybersecurity space, there were few surprises, but there were a few major highlights to this year’s show.

Topics: Cybersecurity multi-factor authentication managed security services

BYOA: Bring Your Own Authentication

Most people who use IT or Internet applications would agree that the current username/password mode of authentication is cumbersome, ineffective, and obsolete. According to ESG research, 55% of information security professionals working at enterprise organizations (i.e., more than 1,000 employees) believe that username/password authentication should be completely eliminated or relegated to non-business critical applications only.

Topics: Cloud Computing Microsoft End-User Computing Private Cloud Infrastructure Information and Risk Management mobile Security and Privacy google Lenovo multi-factor authentication ARM RSA Security Public Cloud Service

Can the FIDO Alliance Act as a Game-Changer and Help Obsolete User Name/Password Authentication?

It seems like yesterday when I was logging onto the VAX system at my alma mater UMass so I could work on a market research project with a statistics program. When my time slot came up, I would sit in front of a VT100 terminal, input my username and password, and voila – a timesharing session at the cutting-edge of high tech.

Well this memory may seem recent but in truth it was back in the mid-1980s. I probably had a mullet and was hankering to listen to Flock of Seagulls at the time. The VAX, mullet, and new wave music are now ancient history but we’re still using user names and passwords for authentication most of the time.

Topics: IBM Apple Microsoft End-User Computing Information and Risk Management mobile Security and Privacy Security google Lenovo endpoint security mobile device multi-factor authentication RSA Security Facebook