Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

CNET: FIDO Alliance looks to create standards for Internet of Things devices

The FIDO Alliance is expanding to develop security standards for IoT devices before internet of things devices boom…

Read More →

VentureBeat: You can now use your Android phone as a 2FA security key for Google accounts on iOS

VentureBeat reports that the newly certified FIDO2 security keys on Android phones can now verify…

Read More →

Dark Reading: How to Get the Most Benefits from Biometrics

The best way to defragment the biometric ecosystem is to adopt FIDO open standards and…

Read More →