Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Fast Company: Yubico’s tiny YubiKey has the future of security all locked up

FIDO standards and FIDO Security Keys turn conventional two-factor authentication on its head and are…

Read More →

Brian Madden: How does FIDO work on non-certified devices (Apple devices)?

FIDO is the “hot thing” in identity and access management in 2019, and there are…

Read More →

InfoSecurity Magazine: Authentication in the Age of GDPR

It’s been over a year since enforcement of the General Data Protection Regulation (GDPR) began,…

Read More →