Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

IT-Zoom: The Passwordless Decade Begins

Authentication via password is neither convenient nor secure. Access technologies that actually manage without a…

Read More →

TEISS: SMS Authentication: why it’s bad (and what to do instead)

Twitter’s Account Security Report shows users still opt for SMS authentication. Andrew Shikiar at the…

Read More →

Global Security Mag: Technology protect against phishing, not training

A byline from by Andrew Shikiar, Executive Director of the FIDO Alliance on the cyber risks…

Read More →