Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

PC World: How Intel Core chips could take over two-factor authentication from your phone

Password manager Dashlane is taking advantage of a feature within Intel’s 8th-generation Core chips that…

Read More →

Science Friday Podcast: How To Make Spoof-Proof Biometric Security

On this episode of the Science Friday Podcast, Stephanie Schuckers, director of the Center for…

Read More →

MakeUseOf: Beware This New Login Scam (And How to Protect Yourself From Hacks)

With a new login scam hitting users, MakeUseOf suggests using FIDO security keys for protection…

Read More →