Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

ComputerWeekly: Time to deploy strong authentication, says FIDO

In this ComputerWeekly story, FIDO Alliance CMO Andrew Shikiar explains that with the tools required…

Read More →

Threatpost: Threatpost Survey Says: 2FA is Just Fine, But Go Ahead and Kill SMS

In a Threatpost survey on two-factor authentication, 57% of respondents said hardware tokens like FIDO…

Read More →

The Parallax: Primer: How to lock your online accounts with a security key

This article in The Parallax reports that FIDO Security Keys, FIDO2 and WebAuthn are gaining…

Read More →