Gift Egwuenu

Going Beyond Passwords: The Future of User Authentication

The future of authentication is passwordless. Learn to implement phishing-resistant login flows using passkeys, biometrics, and SSO.

Going Beyond Passwords: The Future of User Authentication
#1about 3 minutes

The inherent weaknesses and risks of traditional passwords

Traditional passwords are no longer secure due to common user mistakes, frequent data breaches, and sophisticated cyber attacks.

#2about 5 minutes

Best practices for creating and managing secure passwords

Following guidelines like using character combinations, avoiding personal information, and using password managers can significantly improve account security.

#3about 4 minutes

How passwordless authentication with magic links works

Passwordless authentication replaces traditional passwords with methods like magic links or one-time codes sent via email for a more secure login experience.

#4about 5 minutes

Securing accounts with multi-factor authentication layers

Multi-factor authentication adds a crucial security layer by requiring a second verification factor, such as an OTP, SMS code, or a physical security key.

#5about 2 minutes

Understanding the next generation of authentication with passkeys

Passkeys offer a phishing-resistant alternative to passwords by using device-based biometrics like fingerprints or face ID to create secure cryptographic keys.

#6about 5 minutes

How single sign-on simplifies access across applications

Single sign-on (SSO) uses a central identity provider to authenticate a user once, granting them access to multiple applications without separate logins.

#7about 2 minutes

A practical guide to adopting modern authentication methods

Successfully transitioning to modern authentication requires conducting a security assessment, choosing the right methods for your use case, and educating users.

#8about 2 minutes

Addressing SSO risks and account recovery options

The Q&A covers the security of a central SSO provider and the recovery mechanisms available when a user loses access to their phone for SMS-based authentication.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
CH
Chris Heilmann
The top 200 passwords of 2024 can be cracked in less than a second
Passwords are a pain and with biometric logins, passkeys and other two factor authentication methods should be a thing of the past. In reality, though, a lot of systems still use username and password as the only security measure and users choose al...
The top 200 passwords of 2024 can be cracked in less than a second
DC
Daniel Cranney
Dev Digest 167: Open Source AI, Passwordless Microsoft and Vibe Coding
Inside last week’s Dev Digest 167 . 🖼️ Is vibe coding killing creativity? 🌳 Is ChatGPT not as bad for the environment as we think? ⚠️ 95% of AppSec fixes don’t reduce risks 🔑 Microsoft going passwordless 🧠 How to detect memory leaks in your apps 🟨 V...
Dev Digest 167: Open Source AI, Passwordless Microsoft and Vibe Coding
DC
Daniel Cranney
Dev Digest 194: AI vs. Version Control, Password Louvre & Cursed Webdev
Inside last week’s Dev Digest 194 . 🧠 Learn how to become an AI-native software engineer 🤷‍♂️ How can you stand out when anyone can build anything? 👂 Whisper Leak allows listening to encrypted chats 🐝 What’s new the OWASP2025 Top Ten List 🙅‍♀️ Curse...
Dev Digest 194: AI vs. Version Control, Password Louvre & Cursed Webdev

From learning to earning

Jobs that call for the skills explored in this talk.

Security Engineer

Security Engineer

Dashlane
Paris, France

Remote
Azure
Terraform
Kubernetes
Amazon Web Services (AWS)