Over the last few decades, compromised usernames and passwords have typically been at the root of some of the most sensational, damaging, and costly data breaches. An incessant drumbeat of advice about how to choose and use strong passwords and how not to fall prey to social engineering attacks has done little to keep threat actors at bay. 


More

Infosecurity: Strong Authentication Still Elusive for Businesses

According to a new Javelin Strategy & Research “2017 State of Authentication Report,” sponsored by…

Read More →

Engadget: Lenovo and Intel take the first step toward eliminating passwords

Lenovo and Intel announced the first built-in authentication for PCs that adheres to all published…

Read More →

CIO Insight: What New NIST Guidelines Mean for Passwords

FIDO Alliance Executive Director Brett McDowell breaks down the updated NIST guidance, looking at the…

Read More →