Intelligent CISO Issue 15 | Page 34

P RE D I C T I V E I NTELLIGEN CE in authenticators such as fingerprint sensors or facial recognition cameras included in many devices. This choice of authenticators now provides users with a much-improved experience for account management and recovery. For example, a user can choose to use a fingerprint reader to log in to mobile apps on a mobile device and also register a hardware security key. This makes it easy to quickly establish access to accounts on a new device if the original device is upgraded, lost, stolen or compromised. Putting an end to account takeovers and stolen credentials For years, users have been reliant on usernames and passwords to protect their online accounts. Today, millions of user credentials from data breaches around the world are now accessible on the web, including 773 million records known as Collection #1, 34  With much of our personal and business lives now online, the need for stronger security has never been more important to protect our digital identities. making stolen credentials the cause of the vast majority of account takeovers. With WebAuthn, users no longer have to rely on the weak security of passwords. Going forward, users can expect services to offer WebAuthn strong authentication methods including the option to use security keys and built-in platform authenticators to protect online accounts. WebAuthn represents a major step forward in Internet security, paving the way to a world of user- friendly and highly-secure password- free authentication. Outlook With the approval of the new WebAuthn standard, major web browsers and Issue 15 | www.intelligentciso.com