Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

InfoSecurity Magazine: Authentication in the Age of GDPR

It’s been over a year since enforcement of the General Data Protection Regulation (GDPR) began,…

Read More →

PC World: The Online Security Game: How to be on the front foot against the opposition

Organizations can be on the offense when it comes to their defensive strategy by providing…

Read More →

Kuppingercole: Passwordless for the Masses

Microsoft Azure AD support for FIDO may be the final push for organizations considering strong…

Read More →