passwordless
![Passkeys: The Future of Passwordless Authentication](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Passkeys: The Future of Passwordless Authentication
Say goodbye to passwords! Passkeys are the next generation of authentication, offering enhanced security and convenience. Learn how passkeys work, their benefits over passwords, and why they are the future of secure ...
![Mastering Magic Link Security: A Deep Dive for Developers](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Mastering Magic Link Security: A Deep Dive for Developers
Discover the security challenges of magic link authentication and how to mitigate them ...
![What’s the State of Identity Assurance Today? Recap of the 2024 Report](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
What’s the State of Identity Assurance Today? Recap of the 2024 Report
Identity security is at a crossroads. As digital transformation accelerates, organizations are increasingly vulnerable to identity-focused attacks, which are now the primary entry point for cybercriminals. The incorporation of artificial intelligence (AI) ...
![HYPR and Microsoft Partner on Entra ID External Authentication Methods](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
HYPR and Microsoft Partner on Entra ID External Authentication Methods
Last week, Microsoft announced the public preview of external authentication methods (EAM) for Entra ID. As a close partner, HYPR has worked extensively with Microsoft on the new offering and we are ...
![Best Practices to Strengthen VPN Security](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Best Practices to Strengthen VPN Security
Virtual private networks (VPNs) form a staple of the modern work environment. VPNs provide an essential layer of protection for employees working remotely or across multiple office locations, encrypting data traffic to ...
![The Unseen Powerhouse: Demystifying Authentication Infrastructure for Tech Leaders](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
The Unseen Powerhouse: Demystifying Authentication Infrastructure for Tech Leaders
Authentication: The digital gatekeeper. Explore the hidden infrastructure and cutting-edge security keeping your data safe online ...
![passwords, credentials, passkeys, passwordless, passwordless authentication, future, passwords, passkeys, 1Password passwordless credential stuffing Password We Still Use Bad Passwords](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Mapping Your Path to Passwordless
Navigating the shift to passwordless authentication via digital certificates demands a visionary approach that considers the immediate benefits while strategically planning for future scalability and adaptability ...
![Aligning With NSA’s Cloud Security Guidance: Four Takeaways](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Aligning With NSA’s Cloud Security Guidance: Four Takeaways
The National Security Agency (NSA), in conjunction with the Cybersecurity and Infrastructure Security Agency (CISA), recently released its “Top Ten Cloud Security Mitigation Strategies” for organizations to make their cloud environments more ...
![Protecting Against Attacks on NTLM Authentication](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Protecting Against Attacks on NTLM Authentication
When it comes to cyberattacks, March has come in like a lion for Microsoft. Last week, Microsoft said in an SEC filing that that information stolen in a hack of senior leaders’ ...
![Using Deterministic Security Controls To Stop Generative AI Attacks](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Using Deterministic Security Controls To Stop Generative AI Attacks
Deepfake cyberattacks, phishing, and social engineering have all received a turbo boost in recent months due to the proliferation of easily accessed AI tools. Cybercriminals are some of the most creative individuals ...