Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs

    October 14, 2025

    Dull but dangerous: A guide to 15 overlooked cybersecurity blind spots

    October 14, 2025

    Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    October 14, 2025
    Facebook X (Twitter) Instagram
    Trending
    • New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs
    • Dull but dangerous: A guide to 15 overlooked cybersecurity blind spots
    • Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data
    • Is art dead? What Sora 2 means for your rights, creativity, and legal risk
    • Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor
    • AI red flags, ethics boards and the real threat of AGI today
    • I tried smart glasses with xMEMS speakers and active cooling – and they’re full of promise
    • Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Security»Will AI agent-fueled attacks force CISOs to fast-track passwordless projects?
    Security

    Will AI agent-fueled attacks force CISOs to fast-track passwordless projects?

    TechurzBy TechurzMay 28, 2025No Comments1 Min Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Agentic AI
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Passwordless options

    In retiring passwords, security leaders will need to consider their options — passkeys, biometrics, and third-party login services — looking for the best technical, usability, and security fit. There are pros and cons for each option, and in many cases CISOs may be guided towards one based on their existing environment.

    Passkeys, used by Microsoft, Samsung, and Zoho among others, use private device keys and public website keys to authenticate users with a device PIN, biometric, screen unlock pattern or hardware.

    “Passkeys are hardware-backed, can be more phishing-resistant, and have a reduced liability of storing credentials. On the other hand, there’s a lot of overhead, especially with recovery complexity and device dependencies, and there are implementation costs,” says Rana.

    agentfueled attacks CISOS fasttrack force passwordless projects
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWhatsApp is finally available for iPad (and we mean finally)
    Next Article All the news from the Meta monopoly trial
    Techurz
    • Website

    Related Posts

    Security

    New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs

    October 14, 2025
    Security

    Dull but dangerous: A guide to 15 overlooked cybersecurity blind spots

    October 14, 2025
    Security

    Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    October 14, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs

    October 14, 2025

    Dull but dangerous: A guide to 15 overlooked cybersecurity blind spots

    October 14, 2025

    Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    October 14, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.