• Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions
No Result
View All Result
SUBSCRIBE
Smart Solutions World
  • Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions
No Result
View All Result
No Result
View All Result
Home Solutions News world

World Password Day: Sophos Calls For the End of the Password

SmartSolutionUser1 by SmartSolutionUser1
May 1, 2025
in Solutions News world
0
World Password Day: Sophos Calls For the End of the Password
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

On the occasion of World Password Day, Sophos stresses the limits of passwords and knowledge-based authentication methods. Indeed, the sophisticated techniques, tactics, and procedures (TTPs) of cyber attackers in 2025 will enable them to easily circumvent traditional authentication methods. As such, the 2025 edition of Sophos’ Active Adversary report indicates that compromised credentials represent the leading cause of attack for the second year running (41% of cases). It is therefore essential that users and companies adopt more robust methods to protect their data against credential theft.

You might also like

Qlik bets on AI and Cloud with new platform updates

Tata Elxsi collaborates with Mercedes-Benz Research and Development India (MBRDI) for Vehicle Engineering and Software Defined Vehicle (SDV) Development

CyberArk appoints Jeremy Sim to lead channel strategy across Asia Pacific & Japan

The limits of knowledge-based protection

Dual or multi-factor authentication (2FA/MFA) solutions are widely adopted. However, like the password, these additional layers of protection often rely on knowledge-based secret codes shared via SMS or authentication applications. Unfortunately, many of these methods remain vulnerable. Hackers now have tools at their disposal which, like evilginx2, make it easy to bypass these protections by automating phishing or stealing session cookies.

This means that the path of constantly postponing the moment when passwords become obsolete, through fragile additions, seems fraught with danger. The reality of the cyberthreat landscape should push companies towards a paradigm shift away from the password model and knowledge-based shared secrets.

WebAuthn and access keys: towards stronger multifactor authentication?

To protect against phishing, the WebAuthn protocol – which uses access keys or passkeys in particular – is now the subject of consensus among cybersecurity experts. With this method, when an account is created, a unique public/private cryptographic key pair is generated. These are then stored locally: on the site’s server for the public key, and on the user’s terminal for the private key, along with the site name and user ID.

To log in, the user no longer needs to enter a password or secret code shared via SMS or an authentication application. Instead, the server sends a digital authentication request that can only be resolved if the user is in physical possession of a device and can prove that he or she is the owner of the private key – through biometric verification, for example. Authentication is therefore still based on two factors, but these do not depend on the user’s knowledge, but on the physical possession of the device and the user’s own biometric characteristics. In principle, therefore, they cannot be stolen using conventional phishing methods.

What’s more, the authentication process includes a two-way check that enables the user to verify the identity of the service by means of the site domain, sent when the server requests authentication. Unlike methods that use knowledge-based passwords and secret codes, the user is no longer the only one required to prove his or her legitimacy.

Precautions to be taken to ensure robust, simplified authentication

This new industry standard, based on the FIDO2 standard, appears to offer proven protection against phishing – the main threat vector for credential theft – while simplifying authentication for users.

Nevertheless, while WebAuthn represents a major step forward, several vulnerabilities remain, and vigilance is still called for:

  • It is imperative to ensure that the device or cloud where keys are stored is secure;
  • The successful transition to WebAuthn requires buy-in and adoption by businesses and departments;
  • The theft of session cookies remains an attack vector that would enable cyber-attackers to bypass this protection.

It is important to bear in mind that cybercriminals are constantly perfecting their attack methods. That’s why adopting these technologies should be a strategic cybersecurity priority for businesses today.

According to Chester Wisniewski, Director, Global Field CISO at Sophos: “We need to move away from reliance on passwords and shared secrets. Access keys or passkeys today represent the most robust solution for building a future without passwords, phishing and, hopefully, large-scale compromise.”

Tags: World Password Day
Share30Tweet19
SmartSolutionUser1

SmartSolutionUser1

Recommended For You

Qlik bets on AI and Cloud with new platform updates

by SmartSolutionUser1
May 15, 2025
0
Qlik bets on AI and Cloud with new platform updates

Qlik has announced a series of new products and updates to help organizations use data more effectively. Central to this is the introduction of an “agentic AI experience,”...

Read moreDetails

Tata Elxsi collaborates with Mercedes-Benz Research and Development India (MBRDI) for Vehicle Engineering and Software Defined Vehicle (SDV) Development

by SmartSolutionUser1
May 14, 2025
0
Kaspersky Partners With Technobind

Tata Elxsi has announced that it has been selected by Mercedes-Benz Research and Development India for Vehicle Software Engineering and Software Defined Vehicles (SDV) development. Mercedes-Benz has been...

Read moreDetails

CyberArk appoints Jeremy Sim to lead channel strategy across Asia Pacific & Japan

by SmartSolutionUser1
May 14, 2025
0
CyberArk appoints Jeremy Sim to lead channel strategy across Asia Pacific & Japan

CyberArk has appointed Jeremy Sim as Area Vice President, Channels for Asia Pacific & Japan (APJ). In this role, Sim will spearhead the company’s channel strategy across the...

Read moreDetails

Tech Mahindra Announces Senior Leadership Elevations

by SmartSolutionUser1
May 14, 2025
0
USSI Global Elevates Anthony Morelli to President

Tech Mahindra announced key leadership elevations to drive strategic growth in critical markets. Manish Mangal will take over as Head – Americas Communications Business, and Sahil Dhawan has been appointed Head – India, Middle...

Read moreDetails

Gartner Reveals Top Six Cloud Trends

by SmartSolutionUser1
May 13, 2025
0
Cloud Spending Grew 19% In Q2 2024

Gartner has announced the top trends shaping the future of cloud adoption over the next four years. These include cloud dissatisfaction, AI/machine learning (ML), multicloud, sustainability, digital sovereignty and industry solutions....

Read moreDetails
Next Post
Tenable Appoints Eric Doerr As Chief Product Officer

Tenable Appoints Eric Doerr As Chief Product Officer

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Real estate tokenization firm Manifest Brings Instant, Legal Access to $35 Trillion U.S. Property Equity Market for Indian Investors

Real estate tokenization firm Manifest Brings Instant, Legal Access to $35 Trillion U.S. Property Equity Market for Indian Investors

May 8, 2025
ATEN Strengthens Its Leadership with Cutting-Edge KVM Solutions and AV Technologies, Expanding Its Footprint in India

ATEN Strengthens Its Leadership with Cutting-Edge KVM Solutions and AV Technologies, Expanding Its Footprint in India

January 16, 2025
Gartner: 40% of GenAI Solutions will be Multimodal by 2027

Gartner Forecasts Worldwide GenAI Spending to Reach $644 Billion in 2025

April 1, 2025

Browse by Category

  • Article
  • AV Solutions
  • Case Study
  • Cover Story
  • EDU Solutions
  • Featured Article
  • Interview
  • Interview
  • Politics
  • Solutions
  • Solutions Launch world
  • Solutions News world
  • Technology
  • Uncategorized
Smart Solutions World

We bring you the best Premium news, magazine, personal blog, etc. Check our landing page for details.

CATEGORIES

  • Article
  • AV Solutions
  • Case Study
  • Cover Story
  • EDU Solutions
  • Featured Article
  • Interview
  • Interview
  • Politics
  • Solutions
  • Solutions Launch world
  • Solutions News world
  • Technology
  • Uncategorized

BROWSE BY TAG

Accenture Acquisition Acronis Adobe Agentic AI AI Atlassian AWS Barracuda Networks Canalys Cisco Cloud Cloudflare CrowdStrike CyberArk Databricks Gartner GenAI Google Cloud HID IBM InfoComm India 2024 Infosys Kaspersky KnowBe4 Kramer Lenovo NetApp NETGEAR New Relic NTT DATA Nutanix Nvidia Oracle Palo Alto Networks Proofpoint Qlik Salesforce ServiceNow Sify Sophos TCS Tenable Verizon Zoom

© 2024 NCN - Premium news & magazine by NCN.

No Result
View All Result
  • Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions

© 2024 NCN - Premium news & magazine by NCN.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?