Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Gizmodo: How to Do Passwords Right in 2018

Gizmodo suggests security keys that support the FIDO U2F standard as a way to “do…

Read More →

Forbes: How Security Keys Can Protect Your Agency And Clients

Forbes explains how security keys can protect companies from phishing and prevent breaches of client…

Read More →

RSA: Practice Cybersecurity Every Day, Not Just October

This RSA blog for Cybersecurity Month encourages companies to make it a goal for all…

Read More →