CybersecurityIdentity & Access

Phishing-Resistant Authentication

Overview

Authentication methods such as FIDO2 passkeys and hardware security keys that are immune to phishing attacks because credentials are cryptographically bound to the legitimate service.

Cross-References(1)

Cybersecurity

More in Cybersecurity