Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

ARS Technica: iDevices finally get key-based protection against account takeovers

Apple is on board with FIDO Authentication: iOS and iPadOS 13.3 now natively support FIDO2,…

Read More →

The Verge: iOS 13.3 arrives with full support for physical security keys

The Verge reports on Apple’s iOS 13.3 update with FIDO support in the Safari browser…

Read More →

Cybersec Asia: Running Smart Cities on IoT: Time to uproot lax security

IoT devices present danger before, during, and after deployment, and the proliferation of this technology…

Read More →