Cloud 101CircleEventsBlog
Download Presentations from the CSA AI Summit at RSAC Now

Download Publication

Beyond Passwords: The Role of Passkeys in Modern Web Security
Beyond Passwords: The Role of Passkeys in Modern Web Security

Beyond Passwords: The Role of Passkeys in Modern Web Security

Release Date: 11/12/2023

Web authentication methods have evolved significantly over the years to improve security and user experience. In the early days of the internet, usernames and passwords were the primary means of authentication. However, the need for more secure methods became apparent as cyber threats became more sophisticated and effective against victims. This led to the development of two-factor authentication (2FA), which added an extra layer of security by requiring users to provide two types of identification. Despite the added security, 2FA had its limitations, including the inconvenience of providing a second form of identification every time. This paved the way for the emergence of Passkeys as a more secure and user-friendly authentication method.
Download this Resource

Bookmark
Share
View translations
Related resources
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments
Confronting Shadow Access Risks: Considerations...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
Machine Identity in Cybersecurity and IAM
Machine Identity in Cybersecurity and IAM
Automation is Key: DHS Report Unveils Lessons from the Microsoft Exchange Incident
Automation is Key: DHS Report Unveils Lessons from the Microsoft Ex...
Published: 05/02/2024
Defining Cloud Key Management: 7 Essential Terms
Defining Cloud Key Management: 7 Essential Terms
Published: 05/01/2024
Upselling Cybersecurity: Why Baseline Security Features Shouldn’t Be a Commodity
Upselling Cybersecurity: Why Baseline Security Features Shouldn’t B...
Published: 04/24/2024
Secure Your Kubernetes Environment by Enforcing Least Privilege
Secure Your Kubernetes Environment by Enforcing Least Privilege
Published: 04/24/2024

Acknowledgements

Andrew Klaus Headshot Missing
Andrew Klaus

Andrew Klaus

Mark Loveless Headshot Missing
Mark Loveless

Mark Loveless

Guillaume Rossolini Headshot Missing
Guillaume Rossolini

Guillaume Rossolini

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Kurt Seifried
Kurt Seifried
Chief Blockchain Officer & Director of Special Projects, CSA

Kurt Seifried

Chief Blockchain Officer & Director of Special Projects, CSA

For over 2 decades Kurt has been involved in the information security field, starting with Windows and Linux and continuing on to cloud and now Blockchain. With a strong focus on security and privacy Kurt brings a wealth of knowledge and experience to the CSA.

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training