Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

ZDNet: Google transforms Android phones into security keys

At the Google Cloud Next conference, Google showcased the next step it’s taking to get…

Read More →

Venture Beat: You can now use your Android phone as a 2FA security key for Google accounts

Venture Beat reports on Google’s announcement that phones running Android 7.0 Nougat and higher can…

Read More →

Venturebeat: Firefox 66 brings Web Authentication API support for Windows Hello

WebAuthn support for Windows Hello means that with the next Windows 10 update, users will…

Read More →