
Blog

Passkeys and the Future of the Password - Part 2
Authentication systems have evolved over the past few decades. Passwords are a very common way of securing accounts. However, with breaches year after year, it is time to look beyond the password. Part 2 of this series looks at the technical measures designed to protect the password.

Passkeys and the Future of the Password - Part 1
Authentication systems have evolved over the past few decades. Passwords are a very common way of securing accounts. However, with breaches year after year, it is time to look beyond the password. Part 1 of this series looks at the evolution of authentication systems around the password.