Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Cyberscoop: It’s time to put multi-factor authentication in the NIST Cyber Framework

In this article in Cyberscoop, Executive Director Brett McDowell explains why multi-factor authentication is a…

Read More →

The Paypers: You can now meet PSD2 authentication requirements while improving user experience

In this article in The Paypers, FIDO Alliance Executive Director Brett McDowell explains how FIDO…

Read More →

Harvard Business Review: 8 Ways Governments Can Improve Their Cybersecurity

This article in Harvard Business Review lays out 8 principles that governments around the world…

Read More →