ijact-book-coverT

Enterprise Passwordless Journey: A Strategic Approach to Mitigating Risk and Enhancing Security

© 2024 by IJACT

Volume 2 Issue 4

Year of Publication : 2024

Author : Anil Kumar Malipeddi

:10.56472/25838628/IJACT-V2I4P105

Citation :

Anil Kumar Malipeddi, 2024. "Enterprise Passwordless Journey: A Strategic Approach to Mitigating Risk and Enhancing Security" ESP International Journal of Advancements in Computational Technology (ESP-IJACT)  Volume 2, Issue 4: 41-44.

Abstract :

As cybersecurity threats evolve, organizations are increasingly exploring the shift to passwordless authentication as part of their security strategies. Passwords are often a weak link in an organization’s security chain, vulnerable to phishing attacks, credential theft, and poor management practices. This paper outlines the enterprise journey toward adopting a passwordless framework, emphasizing the significance of eliminating passwords, how such a transition can be planned and implemented, and the key benefits of adopting passwordless security. The paper also explores how passwordless solutions mitigate risk and improve compliance and security posture.

References :

[1] The FIDO Alliance. [2022]. FIDO2: Moving the World beyond Passwords. Retrieved from https://fidoalliance.org/fido2/

[2] IBM Security. [2022]. Cost of a Data Breach Report 2022. Retrieved from Cost of a data breach 2024 | IBM

[3] CrowdStrike. [2023]. Passwordless Authentication: The Future of Enterprise Security. Retrieved from Passwordless Authentication | CrowdStrike

[4] SailPoint. [2024]. FIDO2: Passwordless Authentication. Retrieved from Passwordless authentication - Article

[5] TechBullion. [2023]. FIDO2: The Future of Secure Authentication. Retrieved from FIDO2: The Future of Secure Authentication - TechBullion

[6] CyberArk. [2020]. Can we Really Make the World a Passwordless Place. Retrieved from Can We Really Make the World a Passwordless Place?

[7] WebAuthn Documentation. [2022]. A Practical Guide to WebAuthn Implementation. Retrieved from https://webauthn.guide/

Keywords :

Passwordless Authentication, Enterprise Security, Identity and Access Management (IAM), Privileged Access Management (PAM), Artificial Intelligence (AI), Cybersecurity, Phishing, Credential Management.