Moving to Passwordless Authentication
Part 1: The Drivers and Strategy A recent Axiad/ESG survey found that 82% of respondents... The post Moving to Passwordless Authentication appeared first on Axiad ... Read More
The Evolving World of Cybersecurity and Authentication: A Q&A with David Kennedy
Identity security and authentication are having their time in the spotlight. But what should organizations... The post The Evolving World of Cybersecurity and Authentication: A Q&A with David Kennedy appeared first on Axiad ... Read More
Axiad Expands Support for FIDO2 and Azure AD Credentials
New Possibilities Axiad Cloud customers can now register any FIDO2 authenticator with Axiad Cloud and... The post Axiad Expands Support for FIDO2 and Azure AD Credentials appeared first on Axiad ... Read More
FIDO Alliance takes aim at two new cybersecurity challenges. Why should your enterprise care?
Last month FIDO Alliance announced a creation of two new working groups: The Identity Verification and Binding working group (IDWG) and the IoT Technical working group (IoTTWG). In this blog post we explore what cybersecurity challenges these groups are planned to tackle and why your enterprise should start paying attention ... Read More
Are You Doing Everything You Can to Mitigate Your Cyber Security Risks?
In the nine years Axiad has been in business, there has been one constant: our customers are at the core of everything we do – throughout the life of any project. Deploying MFA and PKI through the cloud removes a lot of the complexity and integration cost. The post Are ... Read More
What’s All the Hype about Frictionless?
The reason frictionless experience is such a hot topic is that cybersecurity experts recognize the importance of making it easy for user populations to follow critical security procedures, but all too often, an organization’s goal to deliver a frictionless solution stops at the “end user” experience without looking at the ... Read More
Trust, but verify – 5 tips for selecting a cloud authentication solution
There’s an “arms race” going on between the hackers and the cybersecurity professionals. As lines of defense improve, the bad guys look for the next weak link. And as MFA becomes prevalent, hackers are looking for ways to circumvent it. Hackers tend to be driven by two factors: 1) How ... Read More