We're at a crossroads where authentication protocols and mechanisms need a complete refresh to combat the security breaches involving the exploitation of vulnerabilities, social engineering attacks ...