Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

Help Net Security: The fundamentals of network security and cybersecurity hygiene

This article by Help Net Security reports that FIDO Security Keys can greatly help organizations…

Read More →

Information Management: Three steps toward stronger data protection

The FIDO Alliance has worked to create one of the strongest authentication protocols in the…

Read More →

CSO: 9 cyber security predictions for 2019

In this CSO article, the staff predicts that FIDO2 browser enhancements will help enable multifactor…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.