Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

CIO Insight: What New NIST Guidelines Mean for Passwords

FIDO Alliance Executive Director Brett McDowell breaks down the updated NIST guidance, looking at the…

Read More →

Wired: Google’s ‘Advanced Protection’ Locks Down Accounts Like Never Before

Wired reports that Google has rolled out its Advanced Protection service, where personal Google account…

Read More →

Wired: Google’s ‘Advanced Protection’ Locks Down Accounts Like Never Before

Wired reports that Google has rolled out its Advanced Protection service, where personal Google account…

Read More →