Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

ITSocial: FIDO Alliance creates new integration standard to secure the Internet of Things

The FIDO Alliance has announced the launch of the FIDO Device Onboard (FDO) protocol, a…

Read More →

Reseller News: How the FIDO Alliance Aims to make Passwords Obsolete

Reseller News goes in depth on FIDO Alliance, its mission, and the specifications that websites…

Read More →

Security Boulevard: Are We There Yet? Approaching a Passwordless Future with FIDO2

This article explores the possibility of a passwordless world, what’s driving the passwordless push, barriers to…

Read More →