Cyber Security
Will AI proxy attacks force CISOs to force fast tracking of passwordless projects?

Passwordless option
When retiring passwords, security leaders will need to consider their options – Passkeys, Biometrics and third-party login services – looking for the best technology, availability and security. Each option has its pros and cons, and in many cases, a CISO may guide one based on its existing environment.
Passkeys, used by Microsoft, Samsung, and Zoho, authenticate users using private device keys and public website keys using device PIN, biometrics, screen unlock mode, or hardware.
“PassKey is powered by hardware, can be more phishing, and the burden of storing credentials is reduced. On the other hand, there is a lot of overhead, especially recovery complexity and device dependencies, and there are implementation costs,” Rana said.