FIDO2 authentication standards are great for streamlining the user experience, but CISOs still need PKI to manage machine identity and trusted interactions across the enterprise.
The suspects, who hail from Nigeria, Ghana and the U.S., used websites like Facebook and Google to find victims seeking friendship, companionship and love.
“We are pretty aware of such kinds of threats, and we have training all the time and the protocols to deal with them,” said Ukrainian anti-corruption activist…