Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

SecurityWeek: Ready or Not, Here Comes FIDO: How to Prepare for Success

As we move into a passwordless world, now is the time for organizations to strategically…

Read More →

PYMNTS: Google Moves Beyond The Password With Biometrics

PYMNTS spoke with Executive Director Andrew Shikiar on Google leveraging FIDO2 for some Android login…

Read More →

VentureBeat: Google Accounts now let Android web users authenticate themselves with their fingerprint

Google now allows user to sign into some services on Chrome on Android with just…

Read More →