The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Attacks/Breaches
undefined MIN READ
video
Finally, Plug & Play Authentication!
FIDO Alliance technology will allow enterprises to replace passwords with plug-and-play multifactor authentication.
Phillip M. Dunkelberger
President & CEO, Nok Nok Labs
March 26, 2014
PDF
Operations
Cloud
Mobile
Endpoint
Application Security
Identity & Access Management
Database Security
Authentication
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
Subscribe
More Insights
White Papers
9 Traits You Need to Succeed as a Cybersecurity Leader
A Buyer's Guide to Securing Privileged Access
More White Papers
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
Next-Generation Supply Chain Security
More Webinars
Reports
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
More Reports
Editors' Choice
'Volt Typhoon' China-Backed APT Infiltrates US Critical Infrastructure Orgs
Tara Seals, Managing Editor, News, Dark Reading
CISO Criminalization, Vague Cyber Disclosure Rules Create Angst for Security Teams
Becky Bracken, Editor, Dark Reading
Bridgestone CISO: Lessons From Ransomware Attack Include Acting, Not Thinking
Jai Vijayan, Contributing Writer, Dark Reading
Dark Reading Goes Global
Kelly Jackson Higgins 2, Editor-in-Chief, Dark Reading
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
Next-Generation Supply Chain Security
Here's What Zero Trust Really Means
Mastering Endpoint Security: The Power of Least Privilege
Secrets to a Successful Managed Security Service Provider Relationship
More Webinars
Reports
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Shoring Up the Software Supply Chain Across Enterprise Applications
The Promise and Reality of Cloud Security
More Reports
White Papers
9 Traits You Need to Succeed as a Cybersecurity Leader
A Buyer's Guide to Securing Privileged Access
The Big Business Of Cybercrime: A Deep Dive Guide
Large Insurer goes beyond Breach and Attack Simulation (BAS) with Cymulate
2023 Global Future of Cyber Report
More White Papers
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Black Hat USA - August 5-10 - Learn More
More Events
More Insights
White Papers
9 Traits You Need to Succeed as a Cybersecurity Leader
A Buyer's Guide to Securing Privileged Access
More White Papers
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
Next-Generation Supply Chain Security
More Webinars
Reports
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
More Reports