Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Economie Matin: Delegated authentication – abandon the friction, not the basket

Delegate authentication byline from Alain Martin, Member of the Board of Directors and Co-President at…

Read More →

Informatique News: Strong authentication, the cornerstone of the Zero Trust model

In Europe, the Zero Trust model moved from concept to reality for many enterprises during…

Read More →

The Voice of Fintech Podcast: FIDO – leading the way to a passwordless future with Andrew Shikiar, FIDO’s Executive Director

Andrew Shikiar, Executive Director of FIDO Alliance, sits down with Rudi Falat, Host of The…

Read More →