Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

mHealth Intelligence: Can Behaviors Replace the Password on Mobile Health Devices?

mHealth Intelligence reports on a FIDO Alliance webinar featuring Aetna, who spoke on modern authentication…

Read More →

Health Data Management: What can healthcare providers do about the rising number of security breaches?

FIDO Alliance’s Brett McDowell and Aetna’s Jim Routh explain that, with the increasing frequency of…

Read More →

The Verge: How to set up two-factor authentication on all your online accounts

In this story from The Verge, reporter Natt Garun explains how to set up two-factor…

Read More →