Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Tech Target: How can U2F authentication end phishing attacks?

Tech Target reports on Google’s adoption of FIDO U2F security keys as a strategy to…

Read More →

PC Mag: Why Passwords Might (Finally) Go Away

FIDO Alliance Executive Director Brett McDowell shares insights with PC Mag on the development behind…

Read More →

The Wall Street Journal: The Key to Protecting Yourself Against Hackers

FIDO Alliance Executive Director Brett McDowell notes that passwords are losing their value as a…

Read More →