Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Mobile ID World: CISA Encourages Use of FIDO Authentication to Ensure Election Security

The US Cybersecurity and Infrastructure Security Agency (CISA) is promoting the use of FIDO authentication technology to…

Read More →

ConnectSafely Webinar: Are Passwords Really Protecting Us?

ConnectSafely spoke with online security expert Andrew Shikiar, Executive Director & Chief Marketing Officer of…

Read More →

Information Security Media Group: Accelerating the Path to Passwordless Authentication

In an exclusive video interview with Information Security Media Group, Dr. Rolf Lindemann of Nok…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.