Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Industrie.de: New FIDO standard for secure onboarding of IoT devices

The FIDO Alliance introduces the FIDO Device Onboard (FDO) protocol. This is a new, open…

Read More →

Gov Info Security: New FIDO Protocol Simplifies IoT Device Onboarding

Andrew Shikiar, executive director at the FIDO Alliance, notes: “Businesses recognize the huge potential of…

Read More →

Mobile ID World: FIDO Survey Finds Evidence of Lax Security On Social Media

The FIDO Alliance has released a new report that captures the scope of the social…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.