Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Verdict Magazine: Is the Future of authentication passwordless

Is the future of authentication passwordless? Having strong and different passwords for each of your…

Read More →

Developpez: Cybercriminals are becoming less likely to use brute force attacks on long passwords

Microsoft has invested in recent years in various solutions such as Windows Hello, Microsoft Authenticator,…

Read More →

Finextra: Sift acquires biometric-based authentication provider Keyless

Keyless’ technology meets the Strong Authentication Compliance requirements of PSD2, is FIDO Certified, and helps…

Read More →