The Beyond Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Announcing: Okta Defense Kit

03 Nov 2023

November 3, 2023

Announcing: Okta Defense Kit

Free, privacy-preserving tools to rapidly determine whether your Okta instance is compromised and optimize overall Okta configuration security so you never have to wonder if you’ve been Okta Pwned.

Announcing: Okta Defense Kit
Beyond Identity Was Not Impacted by the Recent Okta Security Incident

26 Oct 2023

October 26, 2023

Beyond Identity Was Not Impacted by the Recent Okta Security Incident

We conclusively determined that our environment was not compromised and no Beyond Identity customers were impacted.

Beyond Identity Was Not Impacted by the Recent Okta Security Incident
A Clear Path Forward with Okta’s HAR File Challenges

24 Oct 2023

October 24, 2023

A Clear Path Forward with Okta’s HAR File Challenges

Okta recommends sanitizing HAR files but stops short of providing a precise method for doing so. But worry not, Beyond Identity has risen to the occasion.

Thought Leadership
A Clear Path Forward with Okta’s HAR File Challenges
Four Ways to Make Quick Gains in Zero Trust Maturity

12 Oct 2023

October 12, 2023

Four Ways to Make Quick Gains in Zero Trust Maturity

CIOs and CISOs need to lead their organizations toward a pragmatic and structured approach, like the one outlined by CISA’s Zero Trust Maturity Model.

Technical Deep Dive
Four Ways to Make Quick Gains in Zero Trust Maturity
For Developers: What's Beyond Identity?

14 Sep 2023

September 14, 2023

For Developers: What's Beyond Identity?

Better sign on Beyond Identity provides you, the developer, with passkey-based sign on for your web or native mobile app. For your users that...

For Developers: What's Beyond Identity?
FIDO2 vs. WebAuthn: What’s the Difference?

13 Sep 2023

September 13, 2023

FIDO2 vs. WebAuthn: What’s the Difference?

Explore FIDO2 and WebAuthn to understand their differences and choose the protocol that aligns best with your use cases.

FIDO2 vs. WebAuthn: What’s the Difference?
FIDO2 vs. U2F: What’s the Difference?

13 Sep 2023

September 13, 2023

FIDO2 vs. U2F: What’s the Difference?

Passwords are easily guessed and easily stolen, making them the leading cause of security breaches. This is common knowledge at this point.

FIDO2 vs. U2F: What’s the Difference?
What's the Difference Between Passkeys and Passwords?

30 Aug 2023

August 30, 2023

What's the Difference Between Passkeys and Passwords?

As a developer, you understand the importance of ensuring the confidentiality and integrity of digital interactions.

What's the Difference Between Passkeys and Passwords?
Are Passkeys 2FA?

30 Aug 2023

August 30, 2023

Are Passkeys 2FA?

While the increasing adoption of passkeys is exciting, many developers are left wondering about the technical and security nuances.

Are Passkeys 2FA?