Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

9TO5Mac: Apple @ Work Podcast: State of the union for passkeys

In this episode of Apple @ Work, Rew Islam from Dashlane joins the show to talk about…

Read More →

9TO5Mac: Apple @ Work Podcast: State of the union for passkeys

In this episode of Apple @ Work, Rew Islam from Dashlane joins the show to talk about…

Read More →

Security Boulevard: HYPR and Yubico Deepen Partnership to Secure and Scale Passkey Deployment Through Automated Identity Verification

For years, HYPR and Yubico have stood shoulder to shoulder in the mission to eliminate…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.