Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

TechRadar: Trezor Model T Cryptocurrency Wallet Review

The app is fairly intuitive and you can use it to configure two-factor authentication through the…

Read More →

Gardanne: Neowave Launches Wikeo FIDO2, Web Security Key

Article dedicated to the Neowave launch and mentioning the FIDO standards involved.

Read More →

Global Security Mag: Credential Stuffing: Another String to the Hackers’ Arch

Focus on the credential stuffing threat, what it’s about, the risks associated and how to…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.