Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Wall Street Journal Pro Cybersecurity: Twitter’s Security Update

In this brief, the Wall Street Journal reports that Twitter has enhanced users’ login security…

Read More →

TechCrunch: Twitter puts a tighter squeeze on spambots

Twitter has added support for stronger two-factor authentication as Twitter users will now be able…

Read More →

Biometric Update: FIDO Alliance and India PKI Forum to collaborate on spreading digital security

Biometric Update reports that the FIDO Alliance has established a partnership with India PKI Forum to…

Read More →