Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

TechRepublic: How to go beyond passwords in Windows 10

Windows 10 is moving towards more secure options for authentication — including support for the…

Read More →

ITPro Today: The Passwordless Authentication Future May Be Closer Than You Think

Microsoft Edge has joined Firefox and Chrome in adding support for the Web Authentication protocol,…

Read More →

Dark Reading: Is SMS 2FA Enough Login Protection?

Dark Reading reports on the Reddit breach, citing FIDO Security Keys as a more secure…

Read More →