Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

TechTarget: FIDO authentication standard could signal the passing of passwords

TechTarget reports how FIDO authentication standard could eventually reduce password dependencies as government and industry…

Read More →