Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Passwordless Authentication Is the Next Line of Defense in Cybersecurity
Cybersecurity

Passwordless Authentication Is the Next Line of Defense in Cybersecurity

Chris HughesBy Chris HughesDecember 3, 2021Updated:December 7, 20214 Mins Read
Facebook Twitter LinkedIn Email
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Everyone who has ever used an IT system in this age is familiar with the traditional authentication method used. We all know the story of usernames and passwords. From a user perspective, we know the frustrations such as memorizing passwords for countless sites and systems that we interact with. We know the exhausting cycle of setting, forgetting, and resetting passwords. From a security practitioner’s perspective, we all know the folly of passwords when it comes to protecting systems and data. They’re constantly re-used, weak, and exposed in countless breaches which adversaries then take and target other systems. Passwords are vulnerable to various attacks, ranging from social to more direct such as brute force and dictionary attacks.

Even in 2021, the IBM Ponemon Cost of a Data Breach Report cites that 20% of breaches are initially caused by compromised credentials and have an average total cost of $4.3 million for organizations that are impacted. Yet passwords still remain the primary method of authentication for countless systems and users. Of course, additional methods of security rigor are added, such as multi-factor authentication (MFA), which we have previously discussed.

Given the long history of vulnerability and associated data breaches, the world is increasingly moving towards a new future, a passwordless one. Enter Passwordless Authentication, a method where the user’s identity is authenticated without using a password. But how can this be!? Passwordless authentication utilizes familiar form factors which have been part of the security and technology lexicon for quite some time, such as biometrics, something you have, and adhoc links that help facilitate authentication.

Biometrics are essentially physical characteristics about a system’s user, such as their fingerprint or retina that uniquely identifies them. Something you have is based on the physical or logical possession of the user, such as a phone with an authenticator application like Google Authenticator or perhaps a security key from Yubico. It could also be a cell phone that receives an SMS code, although remember we’ve previously discussed the inherent flaws in the SMS approach. Lastly, many users are likely familiar with the One Time Password (OTP) email-oriented approach, where they receive a unique one-time key via email to help them authenticate to a system, which is also commonly used to support MFA.

While the above methods theoretically could support the shift away from the traditional use of passwords, one of the more prevalent passwordless specifications gaining hold is FIDO2 from the FIDO Alliance. FIDO2 combines what is known as Web Authentication (WebAuthn) and Client-to-Authenticator (CTAP). FIDO2 revolves around the use of cryptographically unique login credentials and FIDO security keys. The keys are unique to each site and FIDO2 is also being embraced by hardware providers such as the aforementioned Yubico.

Some of the world’s largest technology companies such as Microsoft are also working to “make passwords a thing of the past”. Microsoft is facilitating this shift through methods such as the Microsoft Authenticator app, Windows Hello, and others. Through the use of Microsoft Authenticator, users can shift away from the use of passwords and embrace passwordless authentication.

As previously mentioned, attacking the traditional authentication method of passwords is a go-to for malicious actors and hackers. Password compromise has long been involved in the compromise of countless accounts and data breaches. The embrace of passwordless doesn’t guarantee a future free of data breaches and account compromises but it does introduce a more secure method of authentication for users. Users won’t be reusing the same authentication code (their password) across countless sites and won’t be utilizing a code that is easily guessed through dictionary and brute force attacks. While there is no silver bullet in cybersecurity, there is an iterative approach to implementing robust cybersecurity practices, and the push for passwordless is another brick in that wall.

authentication Cybersecurity Cybersecurity channel Cybersecurity is an Enabler featured passwordless
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers

July 3, 2025

AI Agent & Copilot Podcast: AIS’ Brent Wodicka on Operationalizing AI, the Metrics That Matter

July 3, 2025

Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live

July 2, 2025

Slack API Terms Update Restricts Data Exports and LLM Usage

July 2, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers
  • AI Agent & Copilot Podcast: AIS’ Brent Wodicka on Operationalizing AI, the Metrics That Matter
  • Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live
  • Slack API Terms Update Restricts Data Exports and LLM Usage
  • Google Cloud Still World’s Hottest Cloud and AI Vendor; Oracle #2, SAP #3

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.