<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Heard in Tech</provider_name><provider_url>https://heardintech.com</provider_url><author_name>Morgan Blake</author_name><author_url>https://heardintech.com/index.php/author/admin_uz048z5b/</author_url><title>Primary title: - Heard in Tech</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="9FEltbBGEz"&gt;&lt;a href="https://heardintech.com/index.php/2025/10/11/primary-title-2/"&gt;Primary title:&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://heardintech.com/index.php/2025/10/11/primary-title-2/embed/#?secret=9FEltbBGEz" width="600" height="338" title="&#x201C;Primary title:&#x201D; &#x2014; Heard in Tech" data-secret="9FEltbBGEz" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://heardintech.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>Passwordless authentication is moving from optional enhancement to core security strategy. By replacing passwords with cryptographic credentials tied to devices or biometrics, organizations reduce phishing, replay attacks, and account takeover while improving user experience. Here&#x2019;s what businesses need to know to plan an effective passwordless rollout. Why passwordless matters&#x2013; Phishing resistance: Cryptographic authentication methods such [&hellip;]</description><thumbnail_url>https://v3b.fal.media/files/b/koala/sRwkrMc2k93_0XpkNwNn4.jpg</thumbnail_url></oembed>
