'Digital Authentication: Notes on The Road To Passwordless Authentication' authentication zerotrust
The average person now has over 100 accounts that require some form of authentication. The challenge is as urgent as it is difficult to institute better authentication techniques that can be applied across a wide range of assets. In this article we’ll review pros and cons of the most popular authentication strategies along with some of the latest emerging solutions.
For these reasons, the industry has since rolled out a new authentication strategy that mitigates the above issues.Just like it sounds, this category refers to physical objects like phones, token devices, smart cards, NFC tags, and USB drives. These can be configured to provide OTPs, deactivate in case of loss/theft, and are usually application-specific.
While there are obvious benefits to biometric authentication, the downsides are equally clear. They require expensive systems that often still contain critical vulnerabilities and are subject to high maintenance. Equally important are the data privacy, protection, and management policies that make many users reluctant to share their