Moving to Passwordless Authentication

Moving to Passwordless Authentication

| | Authentication
Part 1: The Drivers and Strategy A recent Axiad/ESG survey found that 82% of respondents... The post Moving to Passwordless Authentication appeared first on Axiad ... Read More
Cyber Resilience Vlog E1: How Critical Cybersecurity Trends Will Affect Your Organization

The Evolving World of Cybersecurity and Authentication: A Q&A with David Kennedy

| | Authentication
Identity security and authentication are having their time in the spotlight. But what should organizations... The post The Evolving World of Cybersecurity and Authentication: A Q&A with David Kennedy appeared first on Axiad ... Read More
Axiad Expands Support for FIDO2 and Azure AD Credentials

Axiad Expands Support for FIDO2 and Azure AD Credentials

| | Announcements
New Possibilities Axiad Cloud customers can now register any FIDO2 authenticator with Axiad Cloud and... The post Axiad Expands Support for FIDO2 and Azure AD Credentials appeared first on Axiad ... Read More

FIDO Alliance takes aim at two new cybersecurity challenges. Why should your enterprise care?

| | security bulletin
Last month FIDO Alliance announced a creation of two new working groups: The Identity Verification and Binding working group (IDWG) and the IoT Technical working group (IoTTWG). In this blog post we explore what cybersecurity challenges these groups are planned to tackle and why your enterprise should start paying attention ... Read More

Are You Doing Everything You Can to Mitigate Your Cyber Security Risks?

| | Announcements
In the nine years Axiad has been in business, there has been one constant: our customers are at the core of everything we do – throughout the life of any project. Deploying MFA and PKI through the cloud removes a lot of the complexity and integration cost. The post Are ... Read More

What’s All the Hype about Frictionless?

| | Fresh Takes
The reason frictionless experience is such a hot topic is that cybersecurity experts recognize the importance of making it easy for user populations to follow critical security procedures, but all too often, an organization’s goal to deliver a frictionless solution stops at the “end user” experience without looking at the ... Read More

Trust, but verify – 5 tips for selecting a cloud authentication solution

| | Fresh Takes
There’s an “arms race” going on between the hackers and the cybersecurity professionals. As lines of defense improve, the bad guys look for the next weak link. And as MFA becomes prevalent, hackers are looking for ways to circumvent it. Hackers tend to be driven by two factors: 1) How ... Read More