Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

PhonAndroid: iOS 15: Face ID and Touch ID can now completely replace passwords

With iOS 15, iPhone users will be able to create accounts on compatible sites without…

Read More →

Global Security Mag: $10M+ stolen every day: lessons learned on cryptocurrency account security

The risks of loose security for your digital assets and how to protect your digital…

Read More →

Computerwoche: How MFA is hacked

In June 2020, Apple announced that Safari 14 would support FIDO2 protocols, joining Android and most…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.