Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Google Blog: Beyond passwords: a roadmap for enhanced user security

FIDO Security Keys are easier to use and more secure than other forms of 2FA,…

Read More →

ComputerWeekly: New stolen credentials cache puts spotlight on authentication

In this ComputerWeekly story, Steven Murdoch, chief security architect at OneSpan’s Innovation Centre says FIDO…

Read More →

ITU: Time to eliminate the password: New report on next-generation authentication for digital financial services

FIDO specifications enable users to authenticate locally to their device using biometrics in a model…

Read More →