Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Ars Technica: Apple has Finally Embraced Key-Based 2FA

Security keys are more secure and are finally ready for the masses, reports Ars Technica.…

Read More →

Progress Report: FIDO’s Effort to Eliminate Passwords

“Progress Report: FIDO’s Effort to Eliminate Passwords” FIDO Alliance’s Andrew Shikiar, Executive Director & CMO,…

Read More →

Apple @ Work Podcast: iOS 14 and macOS Big Sur Bring New Password Technology to Market

In this episode of the Apple @ Work podcast, Bradley is joined by Andrew Shikiar…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.