paint-brush
A Guide to Authentication Methodsby@brianwallace
637 reads
637 reads

A Guide to Authentication Methods

by Brian Wallace2mSeptember 18th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

In 2019, there were over 150,000 security incidents and nearly 4,000 confirmed data breaches. In 2020 alone, more than 15 billion stolen credentials were up for sale on the dark web. In 2018, weak or stolen passwords were tied to over 80% of security breaches. Other authentication methods have been created and are in use right now. Time based, one use codes are one of the more secure authorization techniques as they expire after a short period of time. Biometrics are some of the hardest authentication forms to fake, but tech that uses it suffers from false positives.

Company Mentioned

Mention Thumbnail
featured image - A Guide to Authentication Methods
Brian Wallace HackerNoon profile picture
Brian Wallace

Brian Wallace

@brianwallace

Founder @ NowSourcing | Contributor at Hackernoon | Advisor: Google Small Biz, SXSW

Learn More
LEARN MORE ABOUT @BRIANWALLACE'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Brian Wallace HackerNoon profile picture
Brian Wallace@brianwallace
Founder @ NowSourcing | Contributor at Hackernoon | Advisor: Google Small Biz, SXSW

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Coinerblog
Startupnchill