Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Computerwoche: How MFA is hacked

In June 2020, Apple announced that Safari 14 would support FIDO2 protocols, joining Android and most…

Read More →

Digitalisation World: Two-factor authentication yet to deliver?

Even among organisations who have implemented 2FA, only just above a quarter (27%) are rolling…

Read More →

C-Net: Apple Says its New Logon Tech is as easy as Passwords but far more Secure

Apple has begun testing passkeys, a new authentication technology it says are as easy to…

Read More →