Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Brian Madden: What I learned about identity management at Identiverse 2019

According to Brian Madden, FIDO2 and WebAuthn are the biggest buzz in identity today and…

Read More →

Security Magazine: Encryption and Authentication: The One-Two Punch That Protects Your Data

According to Security Magazine, encryption and FIDO Authentication are the one-two punch that protect data…

Read More →

Dark Reading: FIDO Alliance to Tackle Identity Verification and IoT Authentication

The FIDO Alliance has launched two new standards and certifications initiatives to advance identity verification…

Read More →