Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

The Register: You. Shall. Not. Pass… word: Soon, you may be logging into websites using just your phone, face, fingerprint or token

The spec will allow people to authenticate themselves and log into internet accounts using a…

Read More →

Finance Derivative: Cryptocurrency exchanges must tackle their cybersecurity issues

“However, alongside this growing interest in cryptocurrencies is a significant increase in cybersecurity risks. Investors need…

Read More →

Biometric Update: Keyless achieves FIDO2 Certification for face biometrics technology

Keyless has achieved FIDO2 Certification for its enterprise biometric security platform. The news comes after the firm joined the FIDO…

Read More →