Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

InfoSecurity: Podcast

In the September episode of the IntoSecurity podcast, the Infosecurity editorial team take a deep…

Read More →

Silicon: Strong Authentication: AWS launches “operation FIDO”

Has Amazon found a way to develop the use of multifactor authentication on its cloud…

Read More →

Silicon: Entersekt implements FIDO authentication to improve security, user experience and customer choice

To bridge the gap between strong security on the one hand and a good user…

Read More →