This is the good news about today’s MFA environment – there is no shortage of options to choose from. For most organisations, this will mean using the smartphone as the core authenticator, either running an app or using some form of biometrics or FIDO2 WebAuthn. For privileged users, this might be backed up with the gold standard of a FIDO U2F hardware token.


More

ARS Technica: Thousands of sensitive emails stolen in intrusion of Republican campaign arm

In response to the email hack on the National Republican congressional Committee, this article by…

Read More →

Help Net Security: The fundamentals of network security and cybersecurity hygiene

This article by Help Net Security reports that FIDO Security Keys can greatly help organizations…

Read More →

Information Management: Three steps toward stronger data protection

The FIDO Alliance has worked to create one of the strongest authentication protocols in the…

Read More →