Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

New York Times: Google’s Key to Strong Password Protection Runs Into Limits

John Sabin, a former hacker for the National Security Agency, says Google’s Advanced Protection Program…

Read More →

Infosecurity: Strong Authentication Still Elusive for Businesses

According to a new Javelin Strategy & Research “2017 State of Authentication Report,” sponsored by…

Read More →

Engadget: Lenovo and Intel take the first step toward eliminating passwords

Lenovo and Intel announced the first built-in authentication for PCs that adheres to all published…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.