<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Ethan Peterson, Author at OneLogin Identity Management Blog</title>
	<atom:link href="https://www.onelogin.com/blog/author/ethan-peterson/feed" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Best Practices &#38; Advice</description>
	<lastBuildDate>Thu, 15 Feb 2024 13:36:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.4.3</generator>
	<item>
		<title>Simplifying Identity and Access Management (IAM) in K-12 Education</title>
		<link>https://www.onelogin.com/blog/simplifying-identity-and-access-management-iam-in-k-12-education</link>
		
		<dc:creator><![CDATA[Ethan Peterson]]></dc:creator>
		<pubDate>Wed, 25 Oct 2023 19:57:01 +0000</pubDate>
				<category><![CDATA[OneLogin]]></category>
		<guid isPermaLink="false">https://www.onelogin.com/blog/?p=1413</guid>

					<description><![CDATA[<p>In today&#8217;s education landscape, K-12 schools are hubs of learning and growth, filled with opportunities but often caught up in Identity and Access Management (IAM) challenges. Within this complex education environment, an unexpected hero emerges &#8211; the concept of &#8216;degeneracy,&#8217; which we redefine here as simplifying complexity. In this blog, we explore how OneLogin exemplifies [&#8230;]</p>
<p>The post <a href="https://www.onelogin.com/blog/simplifying-identity-and-access-management-iam-in-k-12-education">Simplifying Identity and Access Management (IAM) in K-12 Education</a> appeared first on <a href="https://www.onelogin.com/blog">OneLogin Identity Management Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-1414" src="https://www.onelogin.com/blog/wp-content/uploads/2023/10/BlogImage-OneLogin-K12-Education-PG-82495-02.jpg.optimal.jpg" alt="Simplifying Identity and Access Management in K-12 Education" width="1100" height="500" srcset="https://www.onelogin.com/blog/wp-content/uploads/2023/10/BlogImage-OneLogin-K12-Education-PG-82495-02.jpg.optimal.jpg 1100w, https://www.onelogin.com/blog/wp-content/uploads/2023/10/BlogImage-OneLogin-K12-Education-PG-82495-02-300x136.jpg.optimal.jpg 300w, https://www.onelogin.com/blog/wp-content/uploads/2023/10/BlogImage-OneLogin-K12-Education-PG-82495-02-1024x465.jpg.optimal.jpg 1024w, https://www.onelogin.com/blog/wp-content/uploads/2023/10/BlogImage-OneLogin-K12-Education-PG-82495-02-768x349.jpg.optimal.jpg 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></p>
<p>In today&#8217;s education landscape, K-12 schools are hubs of learning and growth, filled with opportunities but often caught up in <a href="https://www.onelogin.com/learn/iam">Identity and Access Management (IAM)</a> challenges. Within this complex education environment, an unexpected hero emerges &#8211; the concept of &#8216;degeneracy,&#8217; which we redefine here as simplifying complexity. In this blog, we explore how OneLogin exemplifies this by making IAM easier, more secure and user-friendly.</p>
<h2><strong>The Multifaceted Challenges in the Absence of Effective IAM</strong></h2>
<p>Envision a scenario where passwords proliferate at an overwhelming rate, each a distinct gateway to essential academic portals: grading infrastructures, communication platforms and learning management systems. Educators and students traverse this daunting expanse, frequently misplacing their credentials, leading to a cyclical turmoil of password retrieval, wasted academic hours and a tangible undercurrent of frustration.</p>
<p>Venture further into this metaphorical darkness, where unmitigated security risks dwell. In the absence of robust IAM, educational institutions, despite their size and stature, are parallel to vulnerable edifices with unsecured entrances. Data breaches, akin to digital predators, infiltrate with impunity, jeopardizing everything from sensitive personal data to the foundational integrity of educational environments.</p>
<p>The narrative is further complicated as administrative staff find themselves mired in the perpetual task of manually managing user access, akin to an endless manuscript that demands continual attention. This monumental task diverts precious resources from fostering educational advancement and institutional development.</p>
<p>Moreover, these institutions face the daunting challenge of limited visibility regarding user activity, like needing a detailed map yet lacking the key. This lack of transparency not only facilitates unauthorized access but also complicates compliance and security efforts.</p>
<p>However, even within these complexities, there lies the potential for transformation. As these institutional hurdles continue to impede collaborative and educational initiatives, the necessity for a comprehensive solution crystalizes. Herein, OneLogin emerges, wielding the power of strategic simplification in the domain of IAM.</p>
<h2><strong>The Alchemy of Future Trends in IAM for K-12 Schools</strong></h2>
<p>Prophecy speaks of new dawns and evolving magics in the realm of IAM for K-12 schools:</p>
<ol>
<li><em>Biometric Authentication</em>: The arcane arts of fingerprint and facial recognition are no longer the stuff of legend. These technologies, once ensconced in the annals of fantasy, are now potent spells in our IAM grimoire, offering both enhanced security and a pinch of awe.</li>
<li><em>Cloud-Based Solutions</em>: Gaze upon the cloud, not as a mystic would at tea leaves, but as a visionary understanding its boundless potential. The cloud’s alchemy transmutes the leaden troubles of traditional IAM into golden ease, scalability and cost-efficiency.</li>
<li><em>User Self-Service</em>: In our enlightened age, even laymen claim agency over their digital identities. Gone are the days of waiting in line for the administrative wizards to wave their wands. Autonomy is the new elixir, and it&#8217;s a brew best served liberally, resulting in increased productivity and reduced IT costs.</li>
<li><em>Zero Trust Security</em>: In an era of dragons and dungeons, the &#8220;trust, but verify&#8221; adage is quaint. Instead, the Zero Trust model, with its rigorous incantations, permits no entry without thorough scrutiny—even for those within the castle walls.</li>
</ol>
<h2><strong>OneLogin: Mastering the Spellcraft of IAM</strong></h2>
<h3>Password Management</h3>
<p>OneLogin&#8217;s Single Sign-On (SSO) allows users to access multiple applications using one set of login credentials. In an educational setting, this means that neither students, faculty nor staff need to remember a multitude of passwords to access different learning resources and administrative tools. This ease of access not only reduces the &#8220;password fatigue&#8221; but also decreases the risk of security issues related to managing multiple passwords, such as unsafe password practices (like using the same password everywhere) or writing down passwords.</p>
<h3>Enhanced Security</h3>
<p><a href="https://www.onelogin.com/learn/what-is-mfa">Multi-Factor Authentication (MFA)</a> is a security system requiring more than one method of authentication from separate types of credentials to verify a user&#8217;s identity for a login or other transaction. OneLogin&#8217;s MFA goes beyond the basic <a href="https://www.onelogin.com/learn/what-is-2fa">2-factor authentication</a> by including a range of passwordless factors like SMS messaging, smart notifications, biometrics and third-party authenticators. In the context of K-12 schools, this means an extra layer of security for sensitive information, ensuring that only the verified user can access their account even if someone else knows their password.</p>
<h3>Administrative Efficiency</h3>
<p>OneLogin streamlines administrative tasks by automating user provisioning and deprovisioning. This feature enables schools to automatically create user accounts when new students or staff join and to immediately revoke access when they leave. This not only saves significant administrative time but also closes potential security gaps that can occur when former students&#8217; or employees&#8217; access is not removed promptly.</p>
<h3>Visibility and Compliance</h3>
<p>OneLogin provides detailed real-time insights into who is accessing what, when and how. For schools, this means being able to effectively monitor and audit user activities, helping them comply with regulatory standards like the Family Educational Rights and Privacy Act (FERPA) which requires the protection of student education records. Also, in the event of a data breach or any suspicious activity, schools can quickly identify and respond to these security threats.</p>
<h3>Efficient Collaboration</h3>
<p>OneLogin integrates with a plethora of educational applications and platforms, which allows for smooth transitions and collaborative efforts between different programs. For students and teachers, this means less time spent trying to access or share resources and more time on actual learning and teaching. This seamless integration fosters a collaborative environment conducive to effective education, regardless of the physical location of the participants.</p>
<h2><strong>The Bountiful Harvest of OneLogin in K-12</strong></h2>
<p>OneLogin&#8217;s sorcery in IAM is not just about flashy spellwork; it&#8217;s about the bounty it brings to the high tables:</p>
<h3>Productivity Boost</h3>
<p>OneLogin eliminates the need for repeated logins across various educational platforms by implementing Single Sign-On (SSO). This not only saves precious time but also reduces the cognitive load for educators and students. Not juggling a mental library of passwords means more time and mental energy to focus on educational goals and interactive learning.</p>
<h3>Enhanced Security Posture</h3>
<p>OneLogin fortifies security using Multi-Factor Authentication (MFA) and risk-based authentication for a dynamic security posture. These protocols ensure that user identities are verified with high confidence, significantly reducing the risk of unauthorized access. The system continuously evaluates risk and context, adjusting security requirements accordingly, to keep sensitive educational data protected around the clock.</p>
<h3>Cost Savings</h3>
<p>OneLogin mitigates the substantial costs associated with identity-related breaches by providing robust security features, thereby reducing potential financial liabilities. Additionally, its automated user provisioning and de-provisioning significantly cuts down on the administrative hours required to manually manage user lifecycles, resulting in substantial cost savings in labor and preventing over-provisioning of licenses.</p>
<h3>User Satisfaction</h3>
<p>With its intuitive user interface, OneLogin makes navigation a breeze for all users, regardless of their tech-savvy level. Its SSO capability leads to fewer login-related issues (such as password lockouts or forgotten passwords), dramatically reducing frustration and support requests from users. This smooth experience boosts overall satisfaction among students, staff and faculty.</p>
<h3>Future-Proofing</h3>
<p>OneLogin stays ahead of the curve by consistently integrating newer, advanced technologies and standards in identity management. Its scalable infrastructure means it can handle an increasing number of users and services, growing with the institution. Regular updates and a commitment to innovation ensure that educational institutions are always at the <a href="https://www.oneidentity.com/solutions/iam-for-higher-education/">forefront of IAM technology</a>, prepared for both current and emerging digital challenges.</p>
<h2><strong>Conclusion</strong></h2>
<p>In this narrative, &#8216;degeneracy&#8217; undergoes a transformative renaissance, casting off its conventional associations to embody a higher calling: to streamline, to elucidate and to fortify. OneLogin emerges as the stalwart advocate in this journey, transmuting the intricate mazes of IAM in education into navigable routes of simplicity and fortification. Educational institutions, previously encumbered by various challenges, now stand resilient as bastions of learning and innovation, their futures securely inscribed in the continuum of educational advancement.</p>
<h2><strong>Call to Action</strong></h2>
<p>Ready to integrate the robust capabilities of OneLogin into your K-12 institution&#8217;s strategic approach to IAM? We invite you to connect with us for a bespoke consultation, commencing a collaborative journey toward comprehensive digital empowerment. With OneLogin, your school is elevated beyond a traditional learning environment. It becomes a vanguard of progress, a torchbearer of enlightenment amidst the ever-evolving digital era.</p>
<p>The post <a href="https://www.onelogin.com/blog/simplifying-identity-and-access-management-iam-in-k-12-education">Simplifying Identity and Access Management (IAM) in K-12 Education</a> appeared first on <a href="https://www.onelogin.com/blog">OneLogin Identity Management Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Modernizing cybersecurity: FIDO2 and WebAuthn as dynamic digital locksmiths</title>
		<link>https://www.onelogin.com/blog/modernizing-cybersecurity-fido2-and-webauthn-as-dynamic-digital-locksmiths</link>
		
		<dc:creator><![CDATA[Ethan Peterson]]></dc:creator>
		<pubDate>Mon, 21 Aug 2023 21:29:05 +0000</pubDate>
				<category><![CDATA[OneLogin]]></category>
		<category><![CDATA[Advanced Authentication]]></category>
		<category><![CDATA[FIDO2]]></category>
		<category><![CDATA[Passkeys]]></category>
		<category><![CDATA[Passwordless]]></category>
		<category><![CDATA[WebAuthn]]></category>
		<guid isPermaLink="false">https://www.onelogin.com/blog/?p=1366</guid>

					<description><![CDATA[<p>The quest for impenetrable locks Ever since the invention of the first lock, humans have strived to expose and exploit the vulnerabilities of these safety devices. In 1777, Joseph Bramah, the father of modern pneumatic systems, posted a sign on the window of his London storefront with a unique challenge. The challenge was simple: come [&#8230;]</p>
<p>The post <a href="https://www.onelogin.com/blog/modernizing-cybersecurity-fido2-and-webauthn-as-dynamic-digital-locksmiths">Modernizing cybersecurity: FIDO2 and WebAuthn as dynamic digital locksmiths</a> appeared first on <a href="https://www.onelogin.com/blog">OneLogin Identity Management Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignnone size-full wp-image-1367" src="https://www.onelogin.com/blog/wp-content/uploads/2023/08/BlogImage-78806.jpg.optimal.jpg" alt="Modernizing cybersecurity" width="1100" height="500" srcset="https://www.onelogin.com/blog/wp-content/uploads/2023/08/BlogImage-78806.jpg.optimal.jpg 1100w, https://www.onelogin.com/blog/wp-content/uploads/2023/08/BlogImage-78806-300x136.jpg.optimal.jpg 300w, https://www.onelogin.com/blog/wp-content/uploads/2023/08/BlogImage-78806-1024x465.jpg.optimal.jpg 1024w, https://www.onelogin.com/blog/wp-content/uploads/2023/08/BlogImage-78806-768x349.jpg.optimal.jpg 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></p>
<p><strong>The quest for impenetrable locks</strong></p>
<p>Ever since the invention of the first lock, humans have strived to expose and exploit the vulnerabilities of these safety devices. In 1777, Joseph Bramah, the father of modern pneumatic systems, posted a sign on the window of his London storefront with a unique challenge. The challenge was simple: come inside and open a lock. He would reward you with the modern-day equivalent of $30,000 if you could do it. Bramah even published and distributed a pamphlet explaining the workings of his lock design, such was his confidence in its impregnability.</p>
<p>Bramah&#8217;s lock was designed with precision levers, arranged so that lifting them to the correct height would meet a shear line, permitting the key to turn and unlocking the padlock&#8217;s shackle. The substantial reward offered was a magnet for the gifted, but during Bramah&#8217;s lifetime, no one managed to pick the lock. Therefore, anyone who safeguarded their property with a Bramah&#8217;s lock was practically guaranteed safety. This perfect lock proved very profitable, and Bramah&#8217;s sons, who inherited the business, also benefited from their father&#8217;s ingenious invention. </p>
<p>Bramah&#8217;s unparalleled innovation and the ensuing challenge didn&#8217;t just pique the interest of hopeful lock-pickers but also other inventors and locksmiths of the era. Among them was Jeremiah Chubb, a man inspired by Bramah&#8217;s creation. Seizing the opportunity to advance the design further, Chubb introduced a notable modification. His version could detect unauthorized tampering attempts, signaling when someone had tried to pick the lock. Christened the &#8220;Detector Lock,&#8221; Chubb&#8217;s ingenious tweak was a testament to the fluid nature of innovation. While Bramah had laid a robust foundation for the modern lock, it was clear that the quest for the ultimate security device would always drive artisans to refine and reimagine existing designs. The success of both these locks underscored an era of unparalleled security advancements, setting the stage for future innovations in the realm of protective mechanisms. </p>
<p><strong>From unbreakable to unlocked: The 52-hour feat </strong></p>
<p>A.C. Hobbs, an American locksmith with a burgeoning reputation, confidently approached Bramah&#8217;s sons. Known in the U.S. for his unique skillset—cracking safes and subsequently selling banks his improved designs—Hobbs had recently made waves in England. At a world convention, he astoundingly defeated the Chubbs security lock in just 25 minutes, a feat that stunned the locksmith community. Bolstered by this triumph, he challenged the Bramah legacy, claiming he could breach their renowned lock. Intrigued, Bramah&#8217;s sons granted him a space above their store, setting a 30-day limit. If Hobbs failed within this timeframe, he&#8217;d have to concede defeat. A mere 52 hours in, he emerged victoriously with the open lock in his hand. </p>
<p>One can only imagine the dread of those who had purchased a lock of this design. For over 70 years, they had basked in the promise of absolute security—a locked door equated to a secure door. Although 52 hours might seem like a long time, the days of absolute physical security were unquestionably over. </p>
<p><strong>The digital door: Cybersecurity in the modern era</strong> </p>
<p>Consider the deadbolt on your front door. You might be surprised to learn that its principles are essentially the same as those of the lock A.C. Hobbs picked in 1851. Spend enough time on the internet, and you&#8217;ll likely encounter videos of several amateur locksmiths skillfully defeating your exact model in less than a minute. </p>
<p>This poses a critical question: Are you secure because the locks on your doors are effective, or are you safe merely because those around you are unaware of their failings or too lazy to rob you? It&#8217;s a pertinent question and extends to other aspects of our lives, notably cybersecurity. </p>
<p>We&#8217;ve transitioned from a world of physical doors and locks to one of digital portals and GUIs. Personally, I&#8217;d rather have someone break into my house and steal a few possessions than hack into my bank account, open credit cards in my name or use my identity for illicit activities on the dark web. The security measures we can manage ourselves &#8211; usernames and passwords &#8211; are precarious for various reasons. With ever-increasing, affordable computing power accessible to all, most people&#8217;s password-protected accounts would be defenseless against brute-force attacks. The solution? Multi-factor authentication. You&#8217;ve heard the spiel: something you know, something you have and something you are. </p>
<p><strong>Modern threats: When MFA is not enough </strong></p>
<p>While <a href="https://www.onelogin.com/learn/what-is-mfa">Multi-factor Authentication (MFA)</a> stands as a barrier in today&#8217;s digital defense strategy, evolving cyber threats prove that no system is invincible. Notably, phishing techniques—where attackers masquerade as trusted entities to deceive individuals into revealing sensitive information—have grown more sophisticated. </p>
<p>Central to this evolution is the Man-In-The-Middle (MITM) attack. In this method, attackers secretly intercept and relay communications between two parties. When a victim believes they are inputting their credentials or MFA code into a trusted site, the attacker captures this data in real time, allowing them to bypass even the most robust authentication processes. The fact that these credentials are being intercepted during a legitimate session makes it a particularly insidious threat. </p>
<p>Recent developments in phishing show attackers prompting users to enter their MFA codes under the guise of &#8220;security checks&#8221; or &#8220;account verifications.&#8221; Unwary users, thinking they are fortifying their security, are unwittingly handing over the very codes meant to protect them. </p>
<p>In some advanced MITM attacks, hackers seamlessly automate the entire process. Upon entering their credentials on a fake site, the attacker simultaneously enters the user&#8217;s information into the real site, gaining instant access and making it almost impossible for the user to realize they&#8217;ve been compromised until it&#8217;s too late. </p>
<p>For a clearer picture of how this all plays out, the video below showcases a real-time MITM attack in action, emphasizing the pressing need for continuous vigilance and education in the realm of cybersecurity. </p>
<div style="width: 1200px;" class="wp-video"><!--[if lt IE 9]><script>document.createElement('video');</script><![endif]-->
<video class="wp-video-shortcode" id="video-1366-1" width="1200" height="675" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.onelogin.com/blog/wp-content/uploads/2023/08/Modernizing-cybersecurity-1.mp4?_=1" /><a href="https://www.onelogin.com/blog/wp-content/uploads/2023/08/Modernizing-cybersecurity-1.mp4">https://www.onelogin.com/blog/wp-content/uploads/2023/08/Modernizing-cybersecurity-1.mp4</a></video></div>
<p><strong>Unlocking digital fortresses: WebAuthn &amp; FIDO2</strong></p>
<p>To stay true to our lock analogy, think of the evolution in cybersecurity as a reflection of the world of locksmithing. Just as one would dream of a lock that changes its mechanism every time it&#8217;s accessed, rendering conventional keys and techniques obsolete, FIDO2 and WebAuthn have come to life with this exact promise in the digital realm, offering passwordless authentication. </p>
<p>Now, why are FIDO2 and WebAuthn the digital locksmithing wonders of our era? Imagine designing a lock where each key is not just unique but metamorphoses after each use. Even if a crafty thief somehow duplicates your key (much like stealing your static password), it&#8217;s rendered useless almost immediately after. </p>
<p>The digital locks of yesterday relied largely on static passwords. But with the advent of FIDO2 and WebAuthn, we&#8217;ve taken a leap in authentication sophistication, closely resembling the innovative locksmithing analogy. At their heart, FIDO2 and WebAuthn aim to eliminate phishing, man-in-the-middle and replay attacks by introducing the ability to adopt <a href="https://www.onelogin.com/blog/advanced-authentication-the-way-forward">advanced authentication</a>. </p>
<p><strong>FIDO2:</strong> This standard, set by the <a href="https://www.oneidentity.com/learn/what-is-fido-authentication.aspx">Fast IDentity Online (FIDO)</a> Alliance, incorporates two main components &#8211; the client (typically a web browser) and the authenticator (which can be a security key, a mobile phone or another device). When accessing a service, the service challenges the authenticator. Instead of sending back a static password or key, the authenticator signs the challenge using a private key with a corresponding public key registered with the service. As the private key never departs from the authenticator and each challenge is unique, it can&#8217;t be reused even if an attacker intercepts the signed response. </p>
<p><strong>WebAuthn:</strong> As part of the FIDO2 project, <a href="https://www.oneidentity.com/learn/defining-web-authentication.aspx">WebAuthn</a> is a web standard championed by the World Wide Web Consortium (W3C). It provides an API that lets web applications use public key cryptography, also known as <a href="https://www.oneidentity.com/learn/what-is-passkey-authentication.aspx">passkeys</a>, for <a href="https://www.oneidentity.com/learn/what-is-passkey-authentication.aspx">user authentication</a>. When a user registers on a site, the WebAuthn API enables the creation of a new public-private key pair on the user&#8217;s authenticator. Only the public key is sent to the server, with the private key securely residing on the user&#8217;s device. On subsequent logins, the server issues a challenge, signed by the authenticator using the private key, and the resulting signature is cross verified with the stored public key. </p>
<p>The genuine magic of FIDO2 and WebAuthn lies in their compatibility with a vast array of authenticators, from <a href="https://www.onelogin.com/learn/biometric-authentication">biometrics</a> such as fingerprints or facial recognition to external hardware tokens. This adaptability, coupled with the robust security of public key cryptography, makes them a powerful alternative to traditional username-password systems. While they don&#8217;t change the &#8216;lock mechanism&#8217; literally after each use, they ensure the keys provided are transient and unique, making conventional attacks obsolete. </p>
<p><strong>The WebAuthn &amp; FIDO2 blueprint: A masterclass in locksmithing</strong></p>
<p>FIDO2 and WebAuthn take a page out of this book but with a sprinkle of modern magic. They&#8217;ve proven their mettle against phishing because they veer away from the pitfalls of shared secrets. Remember the old-school method of typing in a password? Once it&#8217;s out in the wild, it&#8217;s fair game. FIDO2 and WebAuthn sidestep this with a cryptographic handshake. Authenticating only on the genuine website brings the website&#8217;s origin into the authentication dance. Snag the data mid-move? Well, it won&#8217;t waltz to the rhythm of another website, making phishing a dance of futility. </p>
<p>And it doesn&#8217;t end there. Picture a challenge-response mechanism like a secret handshake. The server throws a move (challenge), and only the rightful participant (with the correct private key) knows the countermove (response). Any eavesdropper trying to mimic the sequence in another session finds themselves stumbling. It&#8217;s akin to a key that dissolves post-use in our lock metaphor. </p>
<div style="width: 1200px;" class="wp-video"><video class="wp-video-shortcode" id="video-1366-2" width="1200" height="675" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.onelogin.com/blog/wp-content/uploads/2023/08/Modernizing-cybersecurity-2.mp4?_=2" /><a href="https://www.onelogin.com/blog/wp-content/uploads/2023/08/Modernizing-cybersecurity-2.mp4">https://www.onelogin.com/blog/wp-content/uploads/2023/08/Modernizing-cybersecurity-2.mp4</a></video></div>
<p><strong>Digital locksmithing evolved: Twarting the cleverest of bypasses</strong></p>
<p>Extending our lock analogy, the older MFA methods feel like putting a padlock on an already locked door – a bit more secure but hackable by a persistent burglar. FIDO2 and WebAuthn have scrapped the old door and replaced it with one made of an unyielding, ever-changing alloy, turning security from passive to proactive. If traditional MFA stands as the Bramah lock, these modern protocols are the promise of a lock with uncharted intricacies that are part of an advanced authentication approach. </p>
<p>Lastly, complacency isn&#8217;t an option. Today&#8217;s cyber-world brims with ingenious threats, ever ready to expose a chink in the armor. No system, no matter how advanced, offers an eternal promise of security. But, our best bet is to evolve and adapt, embracing the FIDO2s and WebAuthns of the digital world. After all, the treasures of our digital realm – our identities, stories and secrets – are worth their weight in gold. Guard them with nothing but the best. </p>
<p>Learn how OneLogin by One Identity can help you kickstart your journey towards <a href="https://www.oneidentity.com/solutions/advanced-authentication/">Advanced Authentication</a> and provide stronger protection for your organization.</p>
<p>The post <a href="https://www.onelogin.com/blog/modernizing-cybersecurity-fido2-and-webauthn-as-dynamic-digital-locksmiths">Modernizing cybersecurity: FIDO2 and WebAuthn as dynamic digital locksmiths</a> appeared first on <a href="https://www.onelogin.com/blog">OneLogin Identity Management Blog</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.onelogin.com/blog/wp-content/uploads/2023/08/Modernizing-cybersecurity-1.mp4" length="36925227" type="video/mp4" />
<enclosure url="https://www.onelogin.com/blog/wp-content/uploads/2023/08/Modernizing-cybersecurity-2.mp4" length="74333046" type="video/mp4" />

			</item>
	</channel>
</rss>
