Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

The Wall Street Journal: Aetna Adds Behavior-Based Security to Customer Application

Insurance giant Aetna is rolling out a consumer mobile app that uses FIDO Authentication with…

Read More →

CSO: The Internet of Identities (IoI)

IoT, mobility, cloud and pressing security needs mean that every node must have a trustworthy…

Read More →

The Verge: Two-Factor Authentication is a Mess

While not all two-factor is created equal, The Verge reports that FIDO Authentication is the…

Read More →