Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

POLITICO: Oregon Senator Ron Wyden Calls for Social Security Administration to Adopt FIDO Authentication

VIA POLITICO Morning Cybersecurity Report 10/6/17 NOW THAT’S WHAT I’M TOKEN ABOUT — The Social…

Read More →

SC Magazine: Mnuchin hails FIDO authentication standards

While speaking at the Federal Identity Forum & Exposition, Treasury Secretary Steve Mnuchin called out…

Read More →

The Economist: Where are the flaws in two-factor authentication?

The Economist reports that two-factor authentication methods using SMS or OTPs are flawed, and that…

Read More →