Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

TechTarget: Google’s Mark Risher: New types of 2FA are ‘game changers’

Mark Risher, head of account security at Google, speaks to TechTarget about the benefits of…

Read More →

Google Blog: Beyond passwords: a roadmap for enhanced user security

FIDO Security Keys are easier to use and more secure than other forms of 2FA,…

Read More →

ComputerWeekly: New stolen credentials cache puts spotlight on authentication

In this ComputerWeekly story, Steven Murdoch, chief security architect at OneSpan’s Innovation Centre says FIDO…

Read More →