Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Forbes: Apple Just Made A Striking New Security Move That Could Impact All Users

Apple has joined the FIDO Alliance as a board member, taking its place among giants…

Read More →

Engadget: Google offers free Titan security keys to help secure political campaigns

In a move to help tighten security within political campaigns, Google has announced plans to…

Read More →

ZDNet: Google open-sources the firmware needed to build hardware security keys

Google has released a new open source project called OpenSK that can convert Nordic chip…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.