• Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
21 Jul
2 Min read

Cyber Hero Micro Briefing Series with Matt Topper

July 21, 2023 Nok Nok News Cyber Heros, Featured, Video 0 comments

Security, privacy and identity are very serious topics but the people beyond these technologies are human – they are creative and they find unique ways to solve the complex problems surrounding these topics. This week’s big blockbuster premiere coming in with a bang is “Oppenheimer”, the new Christopher Nolan movie starring Cillian Murphy as the infamous Robert Oppenheimer, father of the atomic bomb. 

Although our Cyber Hero this week may not have created one of the most secretive, private and protected research sites on earth like Oppenheimer, he has built a space where users can scale, build resilience and safely and securely access the service. Matt Topper of UberEther is a big proponent of safety and security, and he believes high-level security should be accessible to everyone, not just a few scientists in Los Alamos. 

While they are not guarding the secrets of the nuclear bomb, most regulated industries have incredibly high security requirements nowadays including multi factor authentication. Listen to Matt dissect the pros and cons of this kind of technology and its place moving forward.

Listen to Matt’s full podcast episode from earlier this week and subscribe to our blog to stay up to date on all the comics and podcasts premiering this summer in our Cyber Hero Origins series!

Read more
14 Jul
2 Min read

Cyber Hero Micro Briefing Series with Rolf Lindemann

July 14, 2023 Nok Nok News Cyber Heros, Featured, Video 0 comments

Could we ask for a better analogy? This week’s blockbuster premier is “Mission Impossible – Dead Reckoning Part One” with the always entertaining Tom Cruise. His character Ethan Hunt and the IMF must track down a dangerous weapon before it falls into the wrong hands. So too are the founders of the FIDO Alliance like Tom Cruise leaping tall buildings and racing through narrow alleyways to protect against “dangerous hackers” looking to get their hands on your passwords!

This week’s Cyber Hero is a little like Tom Cruise – Rolf Lindemann of Nok Nok – dashing and swashbuckling. Rolf has been there since the inception of the FIDO Alliance.  Hear in his own words how the small group of people tackled one of the biggest problems still in the world of computing.

Imagine a group of individuals standing on the beach looking out at the ocean and being told you need to boil all the water. This is what it often felt like when the original founders of the FIDO specification and the FIDO Alliance went through the process of deciding where to begin to replace passwords. They all knew that no one company or person could solve the problem of weak, phishable passwords. But they knew something had to be done as the bandaids being applied to try to strengthen passwords were not working as $100s of millions of dollars were being lost to cybercriminals everyday.  

Listen to Rolf’s full podcast episode from earlier this week and subscribe to our blog to stay up to date on all the comics and podcasts premiering this summer in our Cyber Hero Origins series!

Read more
16 Jun
2 Min read

Cyber Hero Micro Briefing Series with Tammi Hayes

June 16, 2023 Nok Nok News Cyber Heros, Video 0 comments

One of the most highly anticipated summer superhero movies is out today – “The Flash.”  While she can’t travel back in time like The Flash to change what’s happened in the past, our Cyber Hero this week, Tammi Hayes, has been there since the beginning, making us all more secure on the internet.

Tammi has been a cybersecurity champion for over two decades, pioneering its evolution since the early dot-com era. Her involvement with RSA, however, marked merely the beginning of her cybersecurity odyssey.

In this week’s episode of Cyber Hero Origins, Tammi describes her journey to becoming a cybersecurity evangelist and how she’s raised awareness for FIDO and Nok Nok – pushing forward the discourse on passwordless security and helping FIDO to become a globally accepted standard for all industries.

Thank you, Tammi! Your continuous efforts in cybersecurity are not merely a testament to your expertise and dedication, but it also serves as an inspiration for others!

Listen to her full podcast episode from earlier this week and subscribe to our blog to stay up to date on all the comics and podcasts premiering this summer in our Cyber Hero Origins series!

Read more
02 Jun
2 Min read

Intro to Cyber Hero Series – From the Beginning

June 2, 2023 Nok Nok News Cyber Heros, Video 0 comments
Intro to Cyber Hero Series - From the Beginning.
Read more
17 Feb
1 Min read

Nok Nok Featured on Keen On

February 17, 2023 Nok Nok News Company News, passwordless authentication, Video 0 comments

Nok Nok on KEEN ON. When Will Silicon Valley Fix its Annoying Password Problem? Nok Nok’s Phillip Dunkelberger on digital technology that might finally kill the online password as featured on the KEEN ON podcast with Andrew Keen. In this KEEN ON episode, Andrew Keen talks to Nok Nok CEO Phillip Dunkelberger on digital technology that, he promises, will finally kill the online password.

View more KEEN ON content here and enjoy additional Nok Nok Videos here.

Read more
25 Jan
3 Min read

Cross-Device Authentication

January 25, 2023 Nok Nok News Learning Series, Video 0 comments

Welcome to the Nok Nok Video Learning Series. We will look into passwordless authentication, one of the cool new technologies to make authentication more convenient, and more secure. Our focus today are Cross-Device Authentication user experiences. In the previous video, we created a passkey on a smartphone. In this video, we will see how we can authenticate a session on a laptop with this passkey.

A recent development is the Multi-Device Credential. In our previous video we created such a Multi-Device Credential on a smartphone. This credential is a kind of passkey that can be backed up from one device and stored to another. In practice, this is often enabled using trusted cloud services such as Icloud Keychain. This passkey was automatically restored to my laptop. Now I can use this passkey in my laptop to securely sign in without a password. This credential sync works across devices on the same device family. For example, all my Apple devices today. Other platforms are in the process of adding this feature as well.

There is another approach that works across device families. For example, to use a passkey on your smartphone to authenticate your laptop session. This approach lets you use your smartphone as a security key with the passkey remaining on the smartphone but being used by your laptop. To securely bind your smartphone and laptop, typically you scan a QR code shown on the laptop. Then the smartphone and laptop communicate over BLE to ensure physical proximity. Some smartphones remember the QR code binding and don’t require it for subsequent authentications.

Here is a third cross-device authentication method. This is an Out-of-Band method that works across all device families even smart TVs and similar devices. While it doesn’t verify the physical proximity of the two devices, it requires no special support in the primary device. A QR code is displayed on the primary device and scanned by your smartphone. This invokes the passkey on your smartphone to authenticate the session on the primary device.

Our last cross-device authentication method in this video is Push-Out-Of-Band. This method, like the previous one, doesn’t verify device proximity. And it works across all device families without special support in the primary device. You enter your user name on the primary device and the server sends a notification to your smartphone. This triggers the use of your passkey and authenticates the session on the primary device.

We have shown the user experience of major passwordless-flows using one of our DEMO applications. Nok Nok’s next generation platform allows you to easily implement and deploy passwordless authentication to internet scale. This helps you to improve the customer experience, reduce fraud and operating costs, and enable your organization to be passwordless.

Read more
23 Jan
2 Min read

Same-Device User Experience

January 23, 2023 Nok Nok News Learning Series, Video 0 comments

Welcome to the Nok Nok Video Learning Series. We will look into passwordless authentication, one of the cool new technologies to make authentication more convenient, and more secure. Our focus today is the Same-Device User Experience. To onboard new users, you can ask fewer questions providing a simpler experience for accessing your digital services, called progressive profiling. This can be done on any device for web apps and native apps. In this device, we use a web app on IOS using the Safari browser. We ask the user to register a passkey even before we run an identity verification process. So the user can resume the sign up process at any time in the case of hiccups.

In practice, banks will run a document-centric ID proofing process. But for simplicity in this demo, we only use a simple email OTP binding. Behind the scenes the user is bound to the device with a FIDO passkey, turning devices into a possession factor. Your user can then sign in securely and easily the next time. This improves the authentication success rate and reduces the authentication time. The passkey credential is shared on the same device making it seamless to switch between web apps and native apps. As a result, the Same-Device User Experience has the same convenient and phishing-resistant authentication experience in the browser and the native app on the same device. In our next video, we will focus on the Cross-Device Authentication Experience.

Read more
12 Jan
1 Min read

Customers Don’t Need a Password

January 12, 2023 Nok Nok News passwordless authentication, Video 0 comments

In this video, we discuss how your customers don’t need a password with a passwordless authentication solution from Nok Nok. Eighty percent of all cybercrime starts with stolen passwords. Beyond that your customers hate passwords, forget passwords, and use up your valuable resources to reset passwords. But with Nok Nok’s solutions, your customers don’t need a password. That’s because Nok Nok provides passwordless authentication, including expert support for passkeys, that allows customers to easily and securely access your services. That saves time, saves money, and improves the trust your customers have placed in your brand. Choose the company with the largest banks, telcos, and financial services trust to protect their customers. Choose Nok Nok, the global leader in passwordless authentication.

Connect with us on Linked IN

Schedule a Free Learning Session

Read more

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語