Weak, stolen or reused passwords are the root of 8 in 10 data breaches. Fixing the data breach problem means abandoning passwords for something more secure. But what does passwordless authentication even look like? Yaser Masoudnia, the Senior Director Product Management, Identity Access Management, at LogMeIn* takes us there.
The post Eliminate…
- Explained: Two-Factor vs. Multi-Factor Authentication
- Resolve to fix your Online Security Mess in 2020. Here’s how.
- Episode 163: Cyber Risk has a Dunning-Kruger Problem Also: Bad Password Habits start at Home