Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Verdict: Is the future of authentication passwordless?

Passwords – we struggle to remember them, but we can’t live without them. Or can…

Read More →

My Chrome Book: Make two-factor authentication mandatory for every login in Google Workspace

The two-factor authentication, is the best thing that is currently done regarding the security of…

Read More →

IBS Intelligence: FIDO Alliance research tracks passwordless authentication in the UK

FIDO Alliance has launched its Online Authentication Barometer to track the uptake of secure authentication…

Read More →