Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Security Boulevard: Is MFA a Security Illusion?

FIDO2 is a strong authentication standard that detects illegitimate MFA challenges and never presents them…

Read More →

Digital Trends: The Best USB Security Keys for 2021

SoloKeys, an indie developer who shines in creating open-source FIDO2 security keys, is ideal for…

Read More →

Semiconductor Engineering: Security Provisioning Moves Out of the Factory

Security credentials traditionally have been provisioned during chip manufacturing, often as a final part of…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.