Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.


More

MSSP Alert: authID Integrates with Ping to Spread Passwordless Authentication

authID’s decision this month to integrate its biometric identity verification technology with Ping Identity’s PingOne…

Read More →

Ars Technica: Coming to Apple OSes: A seamless, secure way to import and export passkeys

Apple OSes will soon transfer passkeys seamlessly and securely across platforms. Apple this week provided…

Read More →

Passwordless Authentication and the Rise of Passkeys: Expert Insights Podcast with Andrew Shikiar

Andrew Shikiar, Executive Director and CEO of the FIDO Alliance, joins us to discuss the…

Read More →