Biometric Authentication Ring Gaining Traction
Secure your business with CyberHoot Today!!! Sign Up Now Token Ring the new company (not the old networking token ring technology), just received Series C investment that will accelerate growth ...

Or login with email
Join our subscribers list to get the latest news, updates and special offers directly in your inbox
Token Ring the new company (not the old networking token ring technology), just received Series C investment that will accelerate growth and demand for its new biometric authentication tool – a literal ring you wear. The Token Ring features FIDO2 support and can be paired with a user’s phone using the Token Ring App. The tool is gaining traction in cybersecurity as a next-generation passwordless authentication tool supported by industry behemoths Microsoft, Apple, and Google.
Token Ring aims to eliminate the friction of Two-Factor Authentication methods. Current 2FA methods combine a username and password with a one-time passcode generated from a text message or smartphone authentication app to identify and authenticate a user. Token Ring eliminates these challenges by authenticating users with a simple gesture by the person wearing it. Users log in passwordless and never have to sign into their devices manually. Token Ring accomplishes this through its integrated fingerprint sensor ensuring it will authenticate the owner of the ring and no one else.
Token Rings pack a lot of technology into a tiny ring device. Token Ring explains how it works:
“High-density laser-etched circuit boards, wafer-level chip packaging, and a highly optimized layout allow Token’s 83 components and 3 antennas to fit into a 0.25 cubic centimeter space. An advanced power management system orchestrates 3 microprocessors, 3 autonomous sensors, and 2 energy-efficient radios to deliver up to 20 hours of battery life. The platform is designed with security in mind, delivering bank-grade authentication thanks to an EAL-5 certified Secure Element and a 508 dpi capacitive touch fingerprint sensor.”
The Token Ring is a nascent technology for a big cybersecurity budget in companies that are early adopters. One ring can cost hundreds of dollars. For most companies, a Token Ring, or something similar, is too expensive for it to make sense. Additionally, with any new technology, there are certainly bugs to be identified and safety measures to be worked out. For example, CyberHoot wonders if the ring measures your pulse? If you don’t have a pulse does the ring still work? Physical safety becomes a critical factor to CyberHoot considering the use of a Token Ring for access to the critical accounts requiring MFA protection. Are criminals against cutting fingers off to gain access to our critical accounts? We’d like to wait and see how this plays out before adopting such visionary technology.
There are many other actions your company can and should take to help secure your users and systems that cost a good deal less without the potential physical harm they might attract. Continue reading to learn what cost-effective actions your company can take to improve its cybersecurity posture.
The following recommendations will help you and your business stay secure with the various threats you may face on a day-to-day basis. All of the suggestions listed below can be gained by hiring CyberHoot’s vCISO Program development services.
Each of these recommendations, except cyber-insurance, is built into CyberHoot’s product and virtual Chief Information Security Officer services. With CyberHoot you can govern, train, assess, and test your employees. Visit CyberHoot.com and sign up for our services today. At the very least continue to learn by enrolling in our monthly Cybersecurity newsletters to stay on top of current cybersecurity updates.
Sources:
Additional Readings:
hackeridiot Feb 12, 2022 0 16
hackeridiot Nov 11, 2021 0 10
hackeridiot Jan 27, 2022 0 10
hackeridiot Apr 19, 2022 0 8
hackeridiot Jan 27, 2022 0 232
hackeridiot Nov 11, 2021 0 355
hackeridiot Oct 31, 2021 0 115
hackeridiot Jun 25, 2022 0 3
Revolution Market has Forced 2FA, XMR, BTC, a little bit of multisig and the best...
hackeridiot Aug 5, 2022 0 0
Stock and cryptocurrency markets on Thursday saw volatility, after experiencing...
hackeridiot Aug 5, 2022 0 0
U.S. senators have introduced the “Digital Commodities Consumer Protection Act of...
hackeridiot Aug 5, 2022 0 0
The Internal Revenue Service (IRS) has modified the crypto question asked on Form...
hackeridiot Jun 30, 2022 0 12
AlphaBay market is an auction-style darknet marketplace for drugs and other black...
hackeridiot Aug 2, 2022 0 1
Captain Scott Chesbrough assumed the duties of ONI Chief of Staff in June 2018 after...
hackeridiot Aug 5, 2022 0 2
GnuTLS may well be the most widespread cryptographic toolkit you've never heard...
hackeridiot Aug 2, 2022 0 2
In the early years, Soviet space programs used hardware already available and relied...
hackeridiot Aug 2, 2022 0 1
Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups,...
Donate to us on BuyMeACoffee also we have built an app for this site with the real-time post receiving and notification to go and download it.