Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Planet Biometrics: Timehop breach ‘offers a teachable moment’ says FIDO Alliance

FIDO Alliance Executive Director Brett McDowell shares insights with Planet Biometrics on why organizations shouldn’t…

Read More →

Wall Street Journal Pro Cybersecurity: Twitter’s Security Update

In this brief, the Wall Street Journal reports that Twitter has enhanced users’ login security…

Read More →

TechCrunch: Twitter puts a tighter squeeze on spambots

Twitter has added support for stronger two-factor authentication as Twitter users will now be able…

Read More →