Cloud 101CircleEventsBlog

Download Publication

Beyond Passwords: The Role of Passkeys in Modern Web Security
Beyond Passwords: The Role of Passkeys in Modern Web Security

Beyond Passwords: The Role of Passkeys in Modern Web Security

Release Date: 11/12/2023

Web authentication methods have evolved significantly over the years to improve security and user experience. In the early days of the internet, usernames and passwords were the primary means of authentication. However, the need for more secure methods became apparent as cyber threats became more sophisticated and effective against victims. This led to the development of two-factor authentication (2FA), which added an extra layer of security by requiring users to provide two types of identification. Despite the added security, 2FA had its limitations, including the inconvenience of providing a second form of identification every time. This paved the way for the emergence of Passkeys as a more secure and user-friendly authentication method.
Download this Resource

Bookmark
Share
View translations
Related resources
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments
Confronting Shadow Access Risks: Considerations...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
Machine Identity in Cybersecurity and IAM
Machine Identity in Cybersecurity and IAM
Apple's New iMessage, Signal, and Post-Quantum Cryptography
Apple's New iMessage, Signal, and Post-Quantum Cryptography
Published: 05/17/2024
The Risk and Impact of Unauthorized Access to Enterprise Environments
The Risk and Impact of Unauthorized Access to Enterprise Environments
Published: 05/17/2024
Securing Generative AI with Non-Human Identity Management and Governance
Securing Generative AI with Non-Human Identity Management and Gover...
Published: 05/16/2024
Navigating Cloud Security Best Practices: A Strategic Guide
Navigating Cloud Security Best Practices: A Strategic Guide
Published: 05/15/2024

Acknowledgements

Andrew Klaus Headshot Missing
Andrew Klaus

Andrew Klaus

Mark Loveless Headshot Missing
Mark Loveless

Mark Loveless

Guillaume Rossolini Headshot Missing
Guillaume Rossolini

Guillaume Rossolini

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional

Michael Roza

Risk, Audit, Control and Compliance Professional

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Kurt Seifried
Kurt Seifried
Chief Blockchain Officer & Director of Special Projects, CSA

Kurt Seifried

Chief Blockchain Officer & Director of Special Projects, CSA

For over 2 decades Kurt has been involved in the information security field, starting with Windows and Linux and continuing on to cloud and now Blockchain. With a strong focus on security and privacy Kurt brings a wealth of knowledge and experience to the CSA.

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training