Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

TechCrunch: X adds support for passkeys globally on iOS

X has officially extended support for passkeys to all global iOS users. This news was…

Read More →

Tech Telegraph: 5 easy tasks to supercharge your cybersecurity

This post summarises five ways for consumers to improve their cybersecurity. FIDO USB keys and…

Read More →

Source Security: Introducing the latest innovation from Sentry Enterprises: The batteryless multi-funciton biometric credential

Sentry Enterprises announced its latest innovation – a multi-factor physical and logical access solution that…

Read More →