With 50,000 employees and more than a billion users, security and privacy are of critical importance to the Internet giant, Google. Two years ago, they set out with the goal of improving authentication through stronger security, increasing user satisfaction and lowering support costs. In that time, Google deployed FIDO Certified ® security keys. A detailed analysis by this data-driven company has demonstrated clear confirmation of how well FIDO’s approach is suited to making stronger, simpler authentication for employees and consumers.
A behind the scenes look at how Google deployed FIDO Authentication for employees and customers in their efforts towards simpler, stronger authentication.
Luxury home automation wasn’t a face of everyday life. Today it is, though gradually! Directly controlling and seamlessly staying connected with the home systems you use every day via a mobile device would significantly enhance your quality of life. It is not only about remotely controlling the lights, AC, fan, audio systems, curtains, television, kitchen appliances, garage doors, sprinklers from your smartphone from anywhere. Again it is not merely about regularly monitoring the security of your home and your kids from your workplace miles away. It is all about convenience and safety. It is about exploiting the latest of what technology has on offer. It is about saving energy significantly and contributing to the creation of a greener earth through use of energy efficient systems. A smart home offers all of these – comfort, convenience, monetary savings, and safety. Smart Automation has emerged as a reliable and leading service provider in this segment.
If you want to give demo about smart home , Goto this website you can use their simulation
https://realgames.co/docs/homeio/en/
First download home io software and second download scratch2editor for running c# code to connect with controllers of homeio software . The description of how to use homeio is available on the website.
2nd option- https://github.com/home-assistant/home-assistant
Install home assistant on your server windows/linux and connect and follow configuration steps on their website.
3rd utilize ifttt.com prebuilt applets which you can use on your devices.
Additionally you can find script from github , How to use raspberry pi with home assistant.
PaloAlto Networks is world’s Cyber Security leader. Their technologies give 65,000 enterprise customers the power to
protect billions of people worldwide.
Cortex, Demisto & Prisma are the few flagship products to prevent attacks with industry-defining enterprise security platforms. Tightly integrated innovations, cloud delivered and easy to deploy and operate.
A behind the scenes look at how Google deployed FIDO Authentication for employees and customers in their efforts towards simpler, stronger authentication.
Luxury home automation wasn’t a face of everyday life. Today it is, though gradually! Directly controlling and seamlessly staying connected with the home systems you use every day via a mobile device would significantly enhance your quality of life. It is not only about remotely controlling the lights, AC, fan, audio systems, curtains, television, kitchen appliances, garage doors, sprinklers from your smartphone from anywhere. Again it is not merely about regularly monitoring the security of your home and your kids from your workplace miles away. It is all about convenience and safety. It is about exploiting the latest of what technology has on offer. It is about saving energy significantly and contributing to the creation of a greener earth through use of energy efficient systems. A smart home offers all of these – comfort, convenience, monetary savings, and safety. Smart Automation has emerged as a reliable and leading service provider in this segment.
If you want to give demo about smart home , Goto this website you can use their simulation
https://realgames.co/docs/homeio/en/
First download home io software and second download scratch2editor for running c# code to connect with controllers of homeio software . The description of how to use homeio is available on the website.
2nd option- https://github.com/home-assistant/home-assistant
Install home assistant on your server windows/linux and connect and follow configuration steps on their website.
3rd utilize ifttt.com prebuilt applets which you can use on your devices.
Additionally you can find script from github , How to use raspberry pi with home assistant.
PaloAlto Networks is world’s Cyber Security leader. Their technologies give 65,000 enterprise customers the power to
protect billions of people worldwide.
Cortex, Demisto & Prisma are the few flagship products to prevent attacks with industry-defining enterprise security platforms. Tightly integrated innovations, cloud delivered and easy to deploy and operate.
“Verrà introdotto il concetto di Domotica e il suo ambito di applicazione. Differenze tra impianti elettrici classici e domotici e vedremo alcune delle diverse soluzioni utilizzabili per controllare e supervisionare l’impianto da remoto”
DALI Power line communication is a revolutionary technology which allows to control the DALI devices through existing power lines without additional wiring and saving of up to 30% of total install cost. The main advantage is its flexibility – it works with any DALI driver and the installer is not limited by size of the luminaire since the DALI PLC coupler can be installed outside of the luminaire.
The Internet of Things (IoT), sometimes referred to as the Internet of Objects, IoT is basically a complex network that seamlessly connects people and things together through the Internet. Theoretically, anything that can be connected (smart watches, cars, homes, thermostats, vending machines, servers…) and will be connected in the near future using sensors and RFID tags. This allows connected objects to continuously send data over the Web and from anywhere. The first time the term was used in 1999 by Kevin Ashton, the creator of the RFID standard.
The rapid expansion of the Internet of Things has fostered convenience and connectedness for consumers. It has also opened the door for creative hackers. Recently, hackers used hundreds of thousands of common internet-connected devices in consumers’ homes, without the owners’ knowledge, to launch a DDoS attack that temporarily brought down crucial parts of the internet’s infrastructure.
Attacks in the past have shown that passwords in IoT devices provide insufficient security. Additionally, IoT devices are too constrained for implementing biometric functions.
The question then becomes how to authenticate to such devices and can the industry adopt a standardized approach despite a highly fragmented IoT landscape. This presentation by Rolf Lindemann of Nok Nok Labs, explores how FIDO Authentication can provide convenient and strong authentication in an array of IoT use cases.
Security and Authentication of Internet of Things (IoT) DevicesSanjayKumarYadav58
The proposed scheme deals with an authentication and security model for IoT applications. It is based on protecting the network from the intruders, decrease the authentication complexity and increase the communication efficiency of network devices. A signature based authentication scheme proposed for mutual authentication among users and devices in the network. The output of proposed scheme gives the better output compare to existing solutions in terms of End-To-End (E2E), Throughput, and Packet Delivery ratio. The proposed scheme implemented on Network Simulator (NS2).
Presentation at 2015 Association for Financial Professionals (AFP) Annual Conference.
As global organizations use diverse technologies to improve payment efficiency, the SEPA mandate has propelled the use of ISO20022 XML to the international forefront. In this session, attendees will learn how Bayer leveraged their European processing acumen to streamline domestic payments in the US and their future direction with this expanding technology. Speakers provide an overview of the ISO20022 standard, its adoption globally and the forces driving change in the US. They offer insights into navigating the challenges of migrating from traditional payment methods and how the ISO20022 XML standard can deliver value to companies.
https://mloey.github.io/courses/security2017.html
We will discuss the following: Cryptography, Computer Security, OSI Security Architecture, Security Structure Scheme, Key Properties, Symmetric Encryption, Asymmetric Encryption, finally Our Book
Introduction to FIDO: A New Model for AuthenticationFIDO Alliance
An overview of FIDO authentication with a special section on government and policy. This was presented at the European Policy Forum by Jeremy Grant, managing director of The Chertoff Group.
Strong Authentication Trends in GovernmentFIDO Alliance
The new model for stronger, simpler online authentication has implications beyond businesses and their consumers, including government policy and applications. FIDO authentication was designed with security and privacy at the forefront, making it a natural complement for government initiatives in these areas. Explore FIDO's role in policy, what the Alliance is doing in policy and how governments are working to implement FIDO authentication.
“Verrà introdotto il concetto di Domotica e il suo ambito di applicazione. Differenze tra impianti elettrici classici e domotici e vedremo alcune delle diverse soluzioni utilizzabili per controllare e supervisionare l’impianto da remoto”
DALI Power line communication is a revolutionary technology which allows to control the DALI devices through existing power lines without additional wiring and saving of up to 30% of total install cost. The main advantage is its flexibility – it works with any DALI driver and the installer is not limited by size of the luminaire since the DALI PLC coupler can be installed outside of the luminaire.
The Internet of Things (IoT), sometimes referred to as the Internet of Objects, IoT is basically a complex network that seamlessly connects people and things together through the Internet. Theoretically, anything that can be connected (smart watches, cars, homes, thermostats, vending machines, servers…) and will be connected in the near future using sensors and RFID tags. This allows connected objects to continuously send data over the Web and from anywhere. The first time the term was used in 1999 by Kevin Ashton, the creator of the RFID standard.
The rapid expansion of the Internet of Things has fostered convenience and connectedness for consumers. It has also opened the door for creative hackers. Recently, hackers used hundreds of thousands of common internet-connected devices in consumers’ homes, without the owners’ knowledge, to launch a DDoS attack that temporarily brought down crucial parts of the internet’s infrastructure.
Attacks in the past have shown that passwords in IoT devices provide insufficient security. Additionally, IoT devices are too constrained for implementing biometric functions.
The question then becomes how to authenticate to such devices and can the industry adopt a standardized approach despite a highly fragmented IoT landscape. This presentation by Rolf Lindemann of Nok Nok Labs, explores how FIDO Authentication can provide convenient and strong authentication in an array of IoT use cases.
Security and Authentication of Internet of Things (IoT) DevicesSanjayKumarYadav58
The proposed scheme deals with an authentication and security model for IoT applications. It is based on protecting the network from the intruders, decrease the authentication complexity and increase the communication efficiency of network devices. A signature based authentication scheme proposed for mutual authentication among users and devices in the network. The output of proposed scheme gives the better output compare to existing solutions in terms of End-To-End (E2E), Throughput, and Packet Delivery ratio. The proposed scheme implemented on Network Simulator (NS2).
Presentation at 2015 Association for Financial Professionals (AFP) Annual Conference.
As global organizations use diverse technologies to improve payment efficiency, the SEPA mandate has propelled the use of ISO20022 XML to the international forefront. In this session, attendees will learn how Bayer leveraged their European processing acumen to streamline domestic payments in the US and their future direction with this expanding technology. Speakers provide an overview of the ISO20022 standard, its adoption globally and the forces driving change in the US. They offer insights into navigating the challenges of migrating from traditional payment methods and how the ISO20022 XML standard can deliver value to companies.
https://mloey.github.io/courses/security2017.html
We will discuss the following: Cryptography, Computer Security, OSI Security Architecture, Security Structure Scheme, Key Properties, Symmetric Encryption, Asymmetric Encryption, finally Our Book
Introduction to FIDO: A New Model for AuthenticationFIDO Alliance
An overview of FIDO authentication with a special section on government and policy. This was presented at the European Policy Forum by Jeremy Grant, managing director of The Chertoff Group.
Strong Authentication Trends in GovernmentFIDO Alliance
The new model for stronger, simpler online authentication has implications beyond businesses and their consumers, including government policy and applications. FIDO authentication was designed with security and privacy at the forefront, making it a natural complement for government initiatives in these areas. Explore FIDO's role in policy, what the Alliance is doing in policy and how governments are working to implement FIDO authentication.
Getting to Know the FIDO Specifications - Technical TutorialFIDO Alliance
What if we could replace passwords with authentication that is stronger and simpler? Web service providers and enterprises worldwide are looking for a solution to move beyond the frustrating user experience and less-than-stellar security of single-factor password authentication systems. Today FIDO is that solution, providing a rich set of specifications and certifications for an emerging and interoperable ecosystem of hardware, mobile and biometrics-based devices. This ecosystem enables enterprises and web service providers to easily deploy strong authentication solutions that reduce password dependencies and provide a superior, simpler and trusted user experience.
- Learn the ins and outs of FIDO’s specifications, including their applicability to both passwordless (UAF) and second factor (U2F) authentication use cases.
- Learn how FIDO separates user verification from authentication along with other details on the FIDO registration and login process.
- Learn how FIDO authentication protects user privacy and prevents phishing and man-in-the-middle attacks.
Introduces why FIDO membership is beneficial to you - better security, reduced cost, simpler and safer for users. Presented by Brett McDowell, Executive Director of FIDO Alliance
Introduces FIDO Authentication: the problem, the solution, the Alliance and the market. Presented by Brett McDowell, Executive Director of the FIDO Alliance.
This Japanese-language presentation from the FIDO Alliance Japan Working Group covers the representation of major Japanese technology companies in the Alliance and the progress of the Alliance in general, along with the Working Group.
What if we could replace passwords with authentication that is stronger and simpler? Web service providers and enterprises worldwide are looking for a solution to move beyond the frustrating user experience and less-than-stellar security of single-factor password authentication systems. Today FIDO is that solution, providing a rich set of specifications and certifications for an emerging and interoperable ecosystem of hardware, mobile and biometrics-based devices. This ecosystem enables enterprises and web service providers to easily deploy strong authentication solutions that reduce password dependencies and provide a superior, simpler and trusted user experience.
- Learn the ins and outs of FIDO’s specifications, including their applicability to both passwordless (UAF) and second factor (U2F) authentication use cases.
- Learn how FIDO separates user verification from authentication along with other details on the FIDO registration and login process.
- Learn how FIDO authentication protects user privacy and prevents phishing and man-in-the-middle attacks.
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonFIDO Alliance
Brand is part of the team responsible for authentication at Google. Overview of how today's solution to phishing is one time passwords. Introduces and explains Google's experience with security keys. Describes Google's ongoing work and explains how to get started with FIDO Authentication.
Governments seek identity solutions that can deliver not just improved Security – but also Privacy, Interoperability, and better Customer Experiences. FIDO delivers on these key policy priorities.
Identifies security authentication issues and explains how FIDO works to resolve these issues. Gives an overview of how FIDO separates user verification from authentication, supports scalable convenience & security and complements federation.
Google Case Study: Becoming UnphishableFIDO Alliance
Brand is part of the team responsible for authentication at Google. Overview of how today's solution to phishing is one time passwords. Introduces and explains Google's experience with security keys. Describes Google's ongoing work and explains how to get started with FIDO Authentication.
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonFIDO Alliance
Brand is part of the team responsible for authentication at Google. Overview of how today's solution to phishing is one time passwords. Introduces and explains Google's experience with security keys. Describes Google's ongoing work and explains how to get started with FIDO Authentication.
Securing The Reality of Multiple Cloud Apps: Pandora's StoryCloudLock
Doug Meier, Director of Security and Compliance at Pandora, shares how Pandora defines and handles “shadow IT”, assesses and onboards vendors, all while keeping pace with the company’s must-do business in the cloud. He covers hot topics such as single sign-on, identity management, and active directory integration.
One of the sites I administer was recently attacked to the point the security module triggered an alert.
I know there are many amature bloggers and web developers out there who use Wordpress.
There are some pretty simple steps to raising the level of security on your site and this simple presentation takes you though them.
Authentication without Authentication - AppSec CaliforniaSoluto
Authentication is important, but how do you authenticate when user interaction is not an option? For example, an IoT app without a user interface. We need to authenticate the app ― without any predefined credentials. But how?
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockCloudLock
According to the latest IBM X-Force Research report, the average consolidated total cost of a single data breach is $3.8 million. And with data breaches up 22% so far in 2016, across every vertical imaginable, the threat must be addressed. Watch Google and CloudLock's discussion in this hands-on exploration of how your organization can combat these ever changing security threats.
Learn about FIDO Alliance status and plans. From FIDO Alliance Seminar in Washington, D.C., in October, 2015.
FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
If you are in the growing app and SaaS market, you will know all too well about the critical issues surrounding user security and pricy.
Since 2005, Two Factor Authentication has had a growing increase in interest, usage and adoption by businesses and users, as privacy and safety of our online lives becomes more important. Just looking at Google Trends shows that Two Factor Authentication is here to stay, and the forecast shows promising growth.
Simplifying Security: Protecting Your Clients and Your CompanyDrew Gorton
Do you have the answers to your client's security questions? Do you know what questions you should be asking your clients to assess their security risk? During this session we’ll walk through how to have the “security conversation” with your clients, build a team and a process that gives you the confidence to take on larger and more complex projects which bring in additional revenue. Your reputation as an agency (and your client’s business) rely on a safe and secure site. By knowing the common pitfalls you can help navigate the treacherous waters of web security and lead your team to success and happy clients along the way.
COMPUTEX TAIPEI 2013 - Cloud Industry Forum
Topic: Securing the Cloud for a Connected Society
Speaker: Michael Poitner
Global Segment Marketing Director, Authentication, NXP Semiconductors
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsUL Transaction Security
In this session, you will hear security experts from SECDUE talk about reducing a negative impact on user experience from traditional security solutions. You will also learn about emerging technologies that enable you to protect financial, PII, and other sensitive information inside and outside of SAP, while eliminating a negative productivity impact. Learn how you can gain a 360° control by extending roles and authorization configured in SAP to any documents leaving SAP applications, allowing them to be safely accessed, shared, and stored inside the company and beyond, including mobile and cloud platforms. Find out how you can to track and analyze all download activity from SAP systems, identify sensitive data with intelligent classification, and create intuitive DLP policies to prevent data loss, all with minimal work disruptions.
People, process, platform, presented by Adam SingerSocialMedia.org
In his Brands-Only Summit Pre-Conference presentation, Google's Adam Singer shares how to build a smart, flexible analytics organization.
He talks about how getting the right people, implementing the right processes, and using the right technology platform will help you stay current in measuring marketing and sales performance.
This ppt is about how digital threats are growing in sophistication, even individuals with advanced technological expertise may find themselves vulnerable. Read this very useful and informative blog by the best digital marketing agency in Delhi –
Similar to Google Case Study: Strong Authentication for Employees and Consumers (20)
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
5. Proprietary + Confidential
Protect Yourself And Your Users
It's easier than you think for someone to steal a password
Password Reuse Phishing Interception
Social Media
BANK
6. Proprietary + Confidential
123456
Most popular password in 2015
Source: SplashData:
https://www.teamsid.com/wor
st-passwords-2015/
password
2nd most popular password in 2015
7. Proprietary + Confidential
76%
of account
vulnerabilities were due
to weak or stolen
passwords
43%
success rate
for a well designed
phishing page
goo.gl/YYDM79
8. Proprietary + Confidential
SMS Usability
Coverage Issues,
Delay, User Cost
Device Usability
One Per Site,
Expensive, Fragile
User Experience
Users find it hard
Phishable
OTPs are increasingly
phished
$
?
Today: The reality of One Time Passwords
10. Core idea - Standard public key cryptography
● User's device mints new key pair, gives public key to server
● Server asks user's device to sign data to verify the user.
● One device, many services, "bring your own device" enabled
Based on Asymmetric Cryptography
19. ● Enterprise use case
○ Mandated for Google employees
○ Corporate SSO (Web)
○ SSH
○ Forms basis of all authentication
● Consumer use case
○ Available as opt-in for Google consumers
○ Adopted by other relying parties too: Dropbox, Github
Deployment at Google
25. Proprietary + Confidential
Does this work
with a mobile?
How do we deploy
this at scale?
What if they
lose their key?
But what about other enterprises?
29. Proprietary + Confidential
Resources
● To use with Google
Enable 2-Step Verification on your account
Go to: https://security.google.com
Click: 2-Step Verification
Click on the Security Keys tab
● Also use with GitHub, Dropbox, SalesForce
● And / or play with some code
https://github.com/google/u2f-ref-code
https://developers.yubico.com/U2F/Libraries/List_of_libraries.html