Whitehouse Doubles Down on the Imperative for Phishing-Resistant MFA

Whitehouse Doubles Down on the Imperative for Phishing-Resistant MFA

In today’s online world, the importance of robust cybersecurity measures cannot be overstated. Cyber threats continue to evolve, and organizations, both public and private, face a constant battle to protect sensitive data ...
Moving to Passwordless Authentication

Moving to Passwordless Authentication

| | Authentication
Part 1: The Drivers and Strategy A recent Axiad/ESG survey found that 82% of respondents... The post Moving to Passwordless Authentication appeared first on Axiad ...
Results from "Passwordless in the Enterprise Survey," June 2023 answering the question, "Which of the following contributed to the compromise of your organization’s accounts or credentials? (Percent of respondents, N=287, multiple responses accepted)

Stop Focusing on Just Phishing

| | Authentication
Does A Focus on Phishing Make Sense? Most high-profile breaches that I’ve seen in the... The post Stop Focusing on Just Phishing appeared first on Axiad ...
CyberArk identity authentication biometricsidentity AMaaS identity fraud authentication Stealthbits

3 Ways To Build A Stronger Approach to Identity Protection

Identity-based attacks are a growing concern for organizations of all sizes and industries. Here’s how to protect yourself ...
Security Boulevard
Microsoft data human cybersecurity organizations disaster cybersecurity ransomware HelpSystems human side of cybersecurity

Microsoft Entra Expands, Azure Active Directory is Now Entra ID

Microsoft revealed its Azure Active Directory (Azure AD) enterprise identity service will be rebranded Entra ID, a change that will occur by the end of the year ...
Security Boulevard
PRC flag

China Breaches Microsoft Cloud — Spied on US Govt. Email

Storm-0558 Brewing: Multiple Microsoft failures cause data leaks at State and Commerce depts., plus 23 other orgs ...
Security Boulevard

Six Best Practices for a Pragmatic Approach to Phishing Resistance

| | Authentication
The importance of implementing a phishing-resistant strategy has transitioned from being a “nice to have”... The post Six Best Practices for a Pragmatic Approach to Phishing Resistance appeared first on Axiad ...
What is OAuth 2.0?

What is OAuth 2.0?

OAuth 2 allows users to grant third-party applications access to their accounts without sharing their passwords ...
SpyCloud MFA Systems Vulnerable Authentication Bypass

Concerns About Infostealer Malware on the Rise

A SpyCloud report found more than half of respondents are extremely concerned about their ability to thwart attacks that exfiltrate authentication data ...
Security Boulevard