The Journal (Page 2)

Brennenstuhl on Security Engineering

The Dark Side of Passkeys: Critical Notes on FIDO2 Passwordless Authentication

The Dark Side of Passkeys: Critical Notes on FIDO2 Passwordless Authentication

Explore the untold story of FIDO2 Passkeys and delve into the potential risks and challenges of the hyped passwordless authentication approach. Uncover the dark side of this innovative technology and gain valuable insights into its implications for users and online services alike.

Unlocking the Secrets of Passwordless Authentication: Discover the Future of Cybersecurity

Unlocking the Secrets of Passwordless Authentication: Discover the Future of Cybersecurity

Imagine a world where forgotten passwords and frustrating login experiences are a thing of the past, where accessing your online accounts is as simple as unlocking your phone. Welcome to the future of passwordless authentication and passkeys.

Breaking Barriers: Empowering Your Login System with Long Password Support

Breaking Barriers: Empowering Your Login System with Long Password Support

Discover why supporting long passwords is crucial in today's digital landscape, the benefits of increased password entropy, and practical tips to smoothly implement these changes. Stay ahead of cyber threats and foster user trust with a fortified login system. Dive in and break the barriers to a more secure future!

Password Length Recommendation: The Ultimate Guide to Strong Passwords

Password Length Recommendation: The Ultimate Guide to Strong Passwords

Unlock the secrets to robust account security with this comprehensive guide on strong password composition. With industry insights, and essential tips for better password quality to fortify your accounts and protect your data.

Credential Breach Detection: Honeytoken as Defence Against Authentication Attacks

Credential Breach Detection: Honeytoken as Defence Against Authentication Attacks

Discover the power of Honeytoken in credential breach detection, and learn how they bolster defenses against authentication attacks from cybercriminals by improving threat detection.

Striking the Perfect Balance: How to Design a Strong Password Policy That's User-Friendly & Effective

Striking the Perfect Balance: How to Design a Strong Password Policy That's User-Friendly & Effective

In this article, I’ll explore the key components of a strong password policy based on state-of-the-art research and provide practical tips for striking a balance between security and usability.