Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

CSO: Vocal theft on the horizon

Executive Director Brett McDowell tells CSO that, while biometrics can be spoofed in some situations,…

Read More →

CIO: How to protect your Google and Facebook accounts with a security key

This CIO story explains how FIDO Authentication is easier to use while providing stronger authentication…

Read More →

Forbes: Cyber – The Threat Is Real

This Forbes article reports on how the FIDO Alliance focus on industry standards for two…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.