Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Ideem: Q&A with Andrew Shikiar, CEO of FIDO

We had the pleasure of sitting down with Andrew Shikiar, CEO of the FIDO Alliance known for…

Read More →

TechGenyz: Password-Free Future: How Biometrics & Passkeys Unlock True Security 

While biometrics offer convenience, passkeys provide the backbone for the next stage in authentication. Developed…

Read More →

Forbes: The iPhone’s New Camera? Whatever. The iPhone’s New Wallet? Cool. 

Apple’s approach to identity in wallets is built on open standards, including the W3C’s Digital…

Read More →


123290 Next