Call this not a threat but a possible salvation. Increasingnumbers of experts are giving up on the traditionalusername/password login and are beginning to look at devicesthemselves as possible authenticators of identity.

As for the problem with traditional logins, many experts pointto the recent wave of massive cyber breaches – at Adobe, LexisNexis, Dun & Bradstreet and Kroll Background Americaas for instances. Exact details of the how-to of the breaches hasnot been released but in past cases often the key that unlocks thecomputers is when an employee inadvertently gives up his/her login,through keylogging or social engineering.

Thus the rising despair about old-fashioned logins.

Complete your profile to continue reading and get FREE access to, part of your ALM digital membership.

  • Critical information including comprehensive product and service provider listings via the Marketplace Directory, CU Careers, resources from industry leaders, webcasts, and breaking news, analysis and more with our informative Newsletters.
  • Exclusive discounts on ALM and CU Times events.
  • Access to other award-winning ALM websites including and

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.