© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok

Dr. Rolf Lindemann Featured at FIDO Munich

  • Author
    Nok Nok News
  • Published
    14 Jun 2024
  • 0 comments
    Join Conversation

Nok Nok’s Dr. Rolf Lindemann Featured at FIDO Munich Seminar 2024: Strengthening Authentication with Passkeys in Automotive and Beyond

Join Dr. Rolf Lindemann and the FIDO Alliance for a seminar in Munich on July 15, 2024 from 1:25 pm to 1:45 pm for a comprehensive dive into passkeys. The seminar will provide an exploration of the current state of passwordless technology, detailed discussions on how passkeys work, their benefits, case studies, and practical implementation strategies and considerations across sectors, including a focus on automotive and payments use cases.

Attendees will also have the opportunity to engage directly with those who are currently implementing FIDO technology through open Q&A and networking – plus the opportunity to see demos and meet the experts that can help move passkey deployments forward.

 

 

European Identity and Cloud Conference 2024

  • Author
    Nok Nok News
  • Published
    28 Feb 2024
  • 0 comments
    Join Conversation

The European Identity and Cloud Conference 2024 takes place in Berlin, Germany from June 4th the 7th. On the 7th, Nok  Nok’s Rolf Lindemann will be discussing the authentication revolution and the convergence of passkeys and identity wallets.

PSD2 to PSD3 and Customer Authentication Summit

  • Author
    Nok Nok News
  • Published
    28 Feb 2024
  • 0 comments
    Join Conversation
PSD2 to PSD3 and Customer Authentication Summit will feature Nok Nok’s Rolf Lindemann who will discuss Beyond Compliance: Revolutionizing Banking Security with Advanced SCA Protocols. Subject matter will include how banking institutions are moving beyond basic compliance to proactively implement advanced SCA protocols. The significance of staying ahead of regulatory requirements by adopting cutting-edge security measures that go beyond the minimum standards The latest innovations in SCA protocols, emphasizing their role in revolutionizing user authentication methods within the banking sector.

Cyber Hero Micro Briefing Series with Rolf Lindemann

  • Author
    Nok Nok News
  • Published
    14 Jul 2023
  • 0 comments
    Join Conversation
Cyber Heros Featured Video

Could we ask for a better analogy? This week’s blockbuster premier is “Mission Impossible – Dead Reckoning Part One” with the always entertaining Tom Cruise. His character Ethan Hunt and the IMF must track down a dangerous weapon before it falls into the wrong hands. So too are the founders of the FIDO Alliance like Tom Cruise leaping tall buildings and racing through narrow alleyways to protect against “dangerous hackers” looking to get their hands on your passwords!

This week’s Cyber Hero is a little like Tom Cruise – Rolf Lindemann of Nok Nok – dashing and swashbuckling. Rolf has been there since the inception of the FIDO Alliance.  Hear in his own words how the small group of people tackled one of the biggest problems still in the world of computing.

Imagine a group of individuals standing on the beach looking out at the ocean and being told you need to boil all the water. This is what it often felt like when the original founders of the FIDO specification and the FIDO Alliance went through the process of deciding where to begin to replace passwords. They all knew that no one company or person could solve the problem of weak, phishable passwords. But they knew something had to be done as the bandaids being applied to try to strengthen passwords were not working as $100s of millions of dollars were being lost to cybercriminals everyday.  

Listen to Rolf’s full podcast episode from earlier this week and subscribe to our blog to stay up to date on all the comics and podcasts premiering this summer in our Cyber Hero Origins series!

AI Brings Need for Robust Security

  • Author
    Nok Nok News
  • Published
    26 Jun 2023
  • 0 comments
    Join Conversation
Cybersecurity

Title:  AI Brings Need for Robust Security to the Next Level
By: Dr. Rolf Lindemann

New technologies often enable new business models.  That is not a new observation.  The latest new technology is (or more precisely the latest technological break-through has been made using) Artificial Intelligence or “AI”.  Whenever the first signs of such new business models are visible, they trigger discussions around potential benefits and threats of the new technologies.  The latest discussion that caught my attention was the potential (mis-)use of AI for running large scale attacks.  I think it is worth putting that in perspective, because there is an underlying pattern here.  If that catches your attention, you are invited to follow me…

Years back, the internet brought us search engines that made information available in an instant.  To collect and keep updated all that information is an enormous and expensive effort (fixed cost), but it pays off since the cost per query is negligible but the revenue per search generates (advertising) revenue [1].  This is typically called a scalable business model [2].  

First phase of scalable attacks. What works “for good” often also works “for bad”, meaning that people with bad intentions can create scalable business models based on scalable attacks.  We have seen those already.  Back in 2013, hundreds of millions of passwords were stolen [3] adding up to more than a billion stolen passwords at that time [4].   In some way that was the first phase of scalable attacks.  Those were focused on authenticating returning users.  Nok Nok was one of the founding members of the FIDO Alliance that published FIDO Authentication specifications which protect against scalable attacks [5] [6] and hence brings robust security to authentication.

Second phase of scalable attacks was focused on knowledge-based authentication [7], i.e. asking for your mother’s maiden name, name of your first pet, your first car model, social security number etc. to then assume it is only you that could correctly answer those questions.  Unfortunately, the search engines in the internet (see above) often can find the answer to such questions hence making it easy for attackers to create new accounts on behalf of a user.  This is not really surprising as that type of information was not considered a secret by any party and as a result was shared frequently.  Essentially breaking Identity Verification.   As a result, the Federal Financial Institutions Examination Council (FFIEC) stated that identity verification generally shall not solely depend on knowledge-based questions [8].   Document-centric identity proofing evolved as a response to this attack [9].  This means that users scan their picture ID and their face and let a remote service verify they match.  

Third phase of scalable attacks.  When your mom calls you on the phone, how do you know it is her?  First, you might see her phone number in the display of your phone.  Second, you will recognize her voice, and third, during the call you will recognize the way she interacts with you.  Now, maybe there is a number four: you will recognize her face when she uses a video call.  So that makes four independent methods – that looks pretty secure.  Maybe let’s not rely on the phone number as we know about the “Caller ID” spoofing attacks [10] – yet another method lacking robust security: the Caller ID is not cryptographically tied to the phone line.  

So, what about her voice?  This is where AI comes in.  You might have heard about DALL-E [11], the engine using a large-language model that creates images based on your instructions (and the hundreds of millions of images used for training).  There is a similar engine called VALL-E, which simulates anyone’s voice after being trained with just 3 seconds of audio [12].  When I first saw this technology being used in a Bond movie [13], I considered it “science fiction” – now it is real and might soon be easily available to anyone on the darknet.  

What about mom’s face video?  The publicly used term for that is “Deepfake”.  There are very convincing examples available on the internet [14].  The Chaos Computer Club (CCC), Europe’s largest association of hackers, demonstrated how to attack a prominent document-centric identity proofing service using such an attack [15].  Again, these types of  tools might soon be easily available to anyone on the darknet (or already are, but I have not checked).  

So, the only security method that remains is the way she interacts with you.  I am sure this interaction does not change that frequently, so someone observing it once will likely be able to replicate it using the tools mentioned above.  Again, neither my voice nor a video recording of me are considered a secret.  They are often even available on the internet.  So methods that are only secure if no one can replicate such public information at the right time are not robust.

What are the “lessons learned” here?  When it comes to security that is robust against scalable attacks, we cannot rely on the difficulty to create voices nor videos of other people.  Instead, we really must use cryptographic methods directly backed by something the user possesses, like electronic ID cards and hardware backed wallets or indirectly backed by something the user possesses, like cloud wallets with strong proven security using strong user authentication backed by FIDO security keys, passkeys or similar [16].

The recent advances in AI make it very clear that we have to accelerate the shift towards robust security for all remote interactions as methods that were only theoretically attackable (but not practically attacked) before are practically attacked now (or will be in the near future).  This shift towards robust security will then help us to keep fraud under control, accelerate business and provide peace of mind to users – getting us closer to the ePromiseland [17].

Nok Nok at OMNISECURE

  • Author
    Nok Nok News
  • Published
    11 May 2023
  • 0 comments
    Join Conversation

Nok Nok is at OMNISECURE. Join Nok Nok’s Dr. Rolf Lindemann and Netcetera on May 22 in Berlin at OMNISECURE. They’ll discuss FIDO’s role in online shopping. The conference runs from May 22-May24.

 

Nok Nok’s Rolf Lindemann at Identiverse 2023

  • Author
    Nok Nok News
  • Published
    5 Apr 2023
  • 0 comments
    Join Conversation
Company News Events

Join Nok Nok’s Rolf Lindemann at Identiverse 2023 at 8:30 am on June 2nd in Las Vegas as he hosts, Leveraging Multi-Device Passkeys in Regulated Markets. As the leader of product and strategy at Nok Nok, Rolf brings more than 20 years of experience in IT security, he has deep knowledge of security markets and technologies.

Multi-device passkeys offer a convenient way to authenticate across devices – similar to how consumers have learned to authenticate with passwords.  For regulated industries, however, the duplication of keys, the lack of control when introducing new devices pose a compliance challenge.  Additionally, the lack of granularity when suspending or revoking such multi-device credentials adds complexity to practical implementations.

The good news is that there are strategies for overcoming these challenges, making it possible for banks, fintechs, mobile network operators, and other regulated industries to leverage the benefits of passkeys as part of their passwordless journey.  

In Rolf’s session you will learn various approaches for bringing the convenience of passkeys to your customers, while addressing the security requirements imposed on regulated markets.

Register Now

Nok Nok at Identiverse 2023

  • Author
    Nok Nok News
  • Published
    28 Mar 2023
  • 0 comments
    Join Conversation

Nok Nok’s Dr. Rolf Lindemann will speak about Leveraging Multi-Device Passkeys in Regulated Markets at Identiverse 2023 May 30th – June 2nd in Las Vegas.

Passkeys Webinar

  • Author
    Nok Nok News
  • Published
    10 Mar 2023
  • 0 comments
    Join Conversation
Company News FIDO Alliance Webinar

Nok Nok, Trusona, and the FIDO Alliance invite you to a passkeys webinar. Join Nok Nok’s VP Products Rolf Lindemann, Trusona’s CTO John Summers, and the FIDO Alliance’s Andrew Shikiar, Executive Director and CMO for a passkeys webinar streaming through ZOOM on March 28, 2023 at 9am PT. Top Considerations for Supporting Passkeys In Your Digital Business is designed for digital business leaders and product owners looking to gain a better understanding of the benefits of passkeys and their practical implementation in a digital service.

The panel will discuss the immediate readiness of passkeys and the effort required to support them, along with the UX challenges across multiple user journeys. Additionally, they will explore various deployment options and help attendees get started quickly on their passkey journey.

Key takeaways:

• Passkeys have material business value (e.g. auth success, reduced ATOs, etc.)
• Passkeys require an infrastructure to support
• You can get started today
• Partners can ensure a successful passkey implementation

Mark your calendars for 9am PT on Tuesday, March 28, 2023 and register now for this passkeys webinar, a critical discussion about the value of passkeys.

REGISTER

Nok Nok is the trusted leader in passwordless consumer authentication for the world’s largest organizations. Delivering the most innovative authentication solutions in the market today, Nok Nok empowers global organizations to improve the user experience to access digital services while meeting the most advanced privacy and regulatory requirements. Learn more about Nok Nok here.

Trusona was founded with a simple promise: know who’s on the other end. Since 2015, they’ve helped companies achieve higher levels of assurance in digital identity by moving beyond the vulnerabilities of traditional username/password authentication to passwordless identity authentication. Learn about Trusona here.

The FIDO Alliance is an open industry association with a focused mission: authentication standards to help reduce the world’s over-reliance on passwords. The FIDO Alliance promotes the development of, use of, and compliance with standards for authentication and device attestation. Learn more about the FIDO Alliance here.

Nok Nok at Authenticate Summit

  • Author
    Nok Nok News
  • Published
    14 Jun 2022
  • 0 comments
    Join Conversation

Join Nok Nok’s Vice President, Products, Dr. Rolf Lindemann on Thursday at 9 am PT for the Authenticate Virtual Summit: Modernizing Healthcare with Strong Authentication. The summit, sponsored by Nok Nok, will provide expert perspectives and education from leading healthcare organizations, solution providers, and industry experts on how to leverage FIDO and related technologies to modernize healthcare authentication. All sessions will be made available to registrants on-demand following the event. Register for the event here.

Dr. Lindemann is in charge of the development and strategy for the company’s products and solutions. Dr. Lindemann brings more than 20 years of experience in product management, R&D, and operations from the IT security industry and is one of the leading experts in FIDO. A frequent speaker at industry events, Rolf Lindemann worked as Senior Director of Product Management at Symantec where he was responsible for research and product strategy on-device authentication in smart grids and mobile networks.

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語