Lastwall co-founder and CEO Karl Holmqvist explains how artificial intelligence could could soon eliminate the need for password-based security.

Karl Holmqvist, co-founder and CEO of internet security system firm Lastwall, spoke with TechRepublic's Dan Patterson about the flaws of two-factor authentication.
Lastwall looks at how computers connected with a network and the manner in which users interact with the machine, Holmqvist said. The new machine learning algorithms gives a more holistic picture of the technology, Holmqvist added, looking at all the factors in combination with one another helps discern if it is the correct user.
SEE: Big Data Power Tools Bundle (TechRepublic Academy)
"[Lastwall is] using data more intelligently to actually serve a purpose," Holmqvist said. The machine learning makes two-factor authentication really powerful, Holmqvist continued.
Patterson inquired about the privacy of a user's information if this technology got into the wrong hands, if companies are gathering detailed information without the user's knowledge.
Holmqvist assured that Lastwall is very serious about privacy; however, the dangers are ultimately unknown. With technology moving at such a rapid pace, new security issues arise and old security measures may not be as effective.
"If you don't know the risks, it's hard to mitigate against them," Holmqvist said.
The 3 big takeaways for TechRepublic readers
- In order to verify the user's identity, a new machine learning algorithm looks at how users interact with a computer and how the computer connects to the system.
- Lastwall's research helps to use data in a more intelligent manner, serving a true purpose for its users.
- With tech moving as fast as it is, security has a tough time keeping up. The risks involved with two-factor authentication are unknown at the moment, so they are difficult to mitigate.
Also see
- How to enable two-factor authentication on Instagram (TechRepublic)
- Two-Factor Authentication (ZDNet)
- How to set up two-factor authentication for your favorite platforms and services (free PDF) (TechRepublic)
- Make your cloud safer: How you can use two-factor authentication to protect cloud services (ZDNet)
- Why Apple shouldn't force two-factor authentication on iPhone users (TechRepublic)