I appreciate your views Kieran Brown
When it comes to online security, we all want to ensure that our sensitive information is kept safe from prying eyes. That's why the concept of passwordless authentication is so intriguing - it offers a new way of securing our digital lives that doesn't rely on traditional passwords.
What's particularly interesting about passwordless authentication is that it often requires access to another device or tool. This adds an extra layer of security, as it means that even if a threat actor manages to gain access to one of your devices, they still won't be able to access your sensitive information without also having access to the other device or tool.
Of course, like any security measure, passwordless authentication isn't foolproof. There are still ways that threat actors could potentially bypass this type of authentication. However, by using multiple factors to authenticate users, passwordless authentication makes it much harder for attackers to gain access to your sensitive information.
Overall, the concept of passwordless authentication is an exciting development in the world of online security. By using multiple factors to authenticate users, it offers a new way of securing our digital lives that is both effective and convenient. So if you're looking for a way to keep your sensitive information safe, it's definitely worth considering passwordless authentication as an option.
Thanks
Nice read Andy agarwal, what's interesting about passwordless is that it mostly requires access to another device/tool. So if a threat actor compromises your email, they can compromise more accounts using this if the passwordless method is OTP, or magic link to email.
In an organisation I feel passwords are key, as they're the source to accessing the main domain for any user and not all users have company phones for OTP, or access to work email outwith their work laptop for a magix link to be sent. That being said, should the password become compromised and SSO is in play, the threat actor has access to most (if not all) systems for that user.
It's definitely an interesting topic!
Take Care