1. Pingback: Podcast: Passwords are dying, but they're not going anywhere | The Security Ledger

  2. The approach is in context with the environment, what you are protecting and why.
    The philosophy is still relieant on trust (including the trust of Google), secure systems/interactions and protocols (technical and business process).

    Ultimately it’s good research and will provide additional options for all of us to use in our own context – it’s not a silver bullet for all applications.

Security Ledger wants to hear your thoughts! Leave a reply.