• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Resources Blogs

PodChats for FutureCISO: The next evolution of authentication

allantan by allantan
March 29, 2024
PodChats for FutureCISO: The next evolution of authentication

PodChats for FutureCISO: The next evolution of authentication

Share on FacebookShare on Twitter

From the Greek word authentikos, authentication, the act of verifying an identity, continues to evolve. Depending on the context, authentication might involve validating a person’s identity through identity documents, verifying the authenticity of a website with a digital certificate or determining the age of an artefact by carbon dating or ensuring a product is genuine.

For decades passwords have been the most popular mode of authentication when accessing computing resources including applications and data. However, in recent years, its effectiveness has been called into question given its susceptibility to phishing, brute-force attacks and insider threats.

Today, it is widely recognised that passwords, even the use of multifactor authentication, alone are not enough to secure users, networks and systems.

While passwords were meant to protect systems and users from internal and external threats, these have become more of a cybersecurity problem than a solution in 2024. Passwordless authentication has evolved since the 1980s starting with dynamic one-time passwords held by physical fobs.

The passwordless journey

Johan Fantenberg, principal solutions architect for APJ at Ping Identity, acknowledges the challenge organisations will face implementing passwordless authentication. For one thing, the trust of the users in the new technology is a key barrier, he commented adding users are used to viewing passwords as a form of security.

Johan Fantenberg

“Due to the complexity of passwordless solutions, they may find it hard to trust them,” said Fantenberg. “There is also a challenge in educating the general public before organisations can fully implement it.”

“The benefits of biometric authentication might be overshadowed by how well users trust biometrics technology. Users will only start to see the benefits such as its ease of use when they trust the technology.”

John Fantenberg

He posits that the way to start the journey is to understand at the group or enterprise level that passwordless solutions are viable and can be adapted and customised.

Related:  Darktrace leans on AI to enhance threat detection

“It is crucial to be updated on the latest developments in the enterprise application landscape to adopt identity controls,” he advised. “Secondly, organisations need to integrate and onboard that with existing applications. Organisations need to have a well-thought-through plan and execute it in steps.”

AI in authentication

The sophisticated capability of generative AI (GenAI) poses significant risks in the area of cybersecurity. Already GenAI is being used as part of advanced impersonation techniques with AI crafting emails that closely mimic legitimate sources.

“AI and machine learning (ML) give us the capability to analyse and assess user-related signals and analyse those signals in real-time to decide what we need to inject for authentication,” said Fanterberg.

GenAI is being used in the production of varied and dynamic phishing to bypass static security filters. On the positive side, Fantenberg says AI is complementing the capabilities of passwordless solutions by managing risks associated with signals.

“AI might also be used to detect deepfakes and used to verify that these are genuine people using biometrics to authenticate and authorise access. At the same time, bad actors are also leveraging AI and ML,” he continued.

Fantenberg posited that with the speed of attacks coming in, it has been hard for humans alone to analyse them and apply mitigation controls. He believed AI is useful in classifying attacks, tailoring responses in real-time, and looking into patterns never seen before.

Another area AI and ML can help is to look at patterns and close the gap from detection to response,” he continued. “AI can also play an important role in the recovery from an attack by finding out where an identity was compromised and in what way.”

Related:  Cisco Hypershield unveiled to secure data centres and clouds 

Passwordless trends

Fantenberg is certain that AI and ML-driven capabilities are reducing the need for direct human and user interaction apart from presenting one's identity, which is where we see the increase in the uptake of decentralised identity and digital identity wallets.

He points out that organisations need to consider verifiable credentials and allow people to carry cryptographically asserted facts about themselves that can be presented online, person to person and also when interacting with a machine.

He cited the European digital identity program, 'eIDAS' which stands for electronic identification and trust services as groundbreaking in this regard allowing for cross-border authentication.

Click on the PodChat player and hear in detail, Fantenberg’s perspective on how machine learning and artificial intelligence may be influencing the evolution of authentication.

  1. What are the different types of authentication that have the potential to displace or augment current password methods?
  2. Set a baseline: What is passwordless?
  3. What are the challenges with going passwordless?
  4. How do you address concerns about the feasibility and practicality of implementing passwordless security solutions across different industries and sectors?
  5. Is there a role for AI in the passwordless security marketplace?
  6. How should CISOs incorporate AI-embedded practices and technologies to enhance their security posture?
  7. Can you cite examples of passwordless authentication?
  8. You mentioned FIDO 2 Alliance early on.
  9. Cost of deploying passwordless authentication technology.
  10. Looking ahead, what trends do you foresee shaping the future of cybersecurity, particularly in the realm of authentication and access management?
Tags: Authenticationpasswordless authenticationPing IdentityPodchats
allantan

allantan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • DDoS attacks surge in Asia Pacific, claims Cloudflare
  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer
  • Cybersecurity challenges persist despite improved defenses

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl