Authentication
The Benefits of a Converged Identity Credential
Many strictly regulated industries such as banking and finance rely heavily on identity and access management solutions to secure their systems and infrastructure. Unfortunately, as demonstrated by the Okta breach last year, ...
The Next Evolution of IAM: How Generative AI is Transforming Identity and Access
The shift towards AI-powered IAM promises to enhance security, improve user experiences, and simplify complex access management tasks ...
Magic Links Demystified: Simplifying and Securing User Logins
Discover the simplicity and security of magic link authentication in this article. We dive into how magic links work, providing a hassle-free and secure alternative to traditional passwords. By exploring its benefits, ...
Aligning With NSA’s Cloud Security Guidance: Four Takeaways
The National Security Agency (NSA), in conjunction with the Cybersecurity and Infrastructure Security Agency (CISA), recently released its “Top Ten Cloud Security Mitigation Strategies” for organizations to make their cloud environments more ...
Protecting Against Attacks on NTLM Authentication
When it comes to cyberattacks, March has come in like a lion for Microsoft. Last week, Microsoft said in an SEC filing that that information stolen in a hack of senior leaders’ ...
Navigating the NSA’s New Zero-Trust Guidelines
New guidelines from the NSA provide public sector and private organizations with the necessary framework to approach zero-trust ...
The Truth About Passwordless IAM Authentication
Identity and Access Management (IAM) is crucial in managing and authenticating users and securing access to organizational resources. IAM involves identifying users in a system and controlling their access to resources by ...
How to Adopt Phishing-Resistant MFA
In a recent blog post, we discussed what phishing-resistant multi-factor authentication (MFA) is and why... The post How to Adopt Phishing-Resistant MFA appeared first on Axiad ...
HYPR Featured Launch Partner for YubiKey Bio Multi-Protocol Edition (Early Access)
Today Yubico announced the expansion of its YubiKey Bio Series to include multi-protocol keys that support biometric authentication for FIDO and Smart Card/PIV protocols. Like other YubiKey Bio Series, the new multi-protocol ...
Using Deterministic Security Controls To Stop Generative AI Attacks
Deepfake cyberattacks, phishing, and social engineering have all received a turbo boost in recent months due to the proliferation of easily accessed AI tools. Cybercriminals are some of the most creative individuals ...