Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

VentureBeat: You can now use your Android phone as a 2FA security key for Google accounts on iOS

VentureBeat reports that the newly certified FIDO2 security keys on Android phones can now verify…

Read More →

Dark Reading: How to Get the Most Benefits from Biometrics

The best way to defragment the biometric ecosystem is to adopt FIDO open standards and…

Read More →

CSO: Eliminating Bad Password Behavior

CSO reports that FIDO2 represents a major step forward in internet security, paving the way…

Read More →