Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

The Verge: You can now sign into a Microsoft Account without a password using a security key

Microsoft is the first company to support passwordless authentication using FIDO2 WebAuthn and CTAP2 standards…

Read More →

Bank Info Security: State of the Authentication Landscape

In this Bank Info Security article, Shane Weeden, an authentication expert with IBM Security, discusses…

Read More →

Tech Target: How can U2F authentication end phishing attacks?

Tech Target reports on Google’s adoption of FIDO U2F security keys as a strategy to…

Read More →