The Beyond Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Okta Breach Timeline: Breaking Down the Hacks

22 Nov 2023

November 22, 2023

Okta Breach Timeline: Breaking Down the Hacks

Okta's story the last two years highlights the urgent need for stronger defenses against vulnerabilities. Review the Okta breach timeline for insights.

Compliance
Okta Breach Timeline: Breaking Down the Hacks
Beyond Identity's Zero Trust Assessment Tool: Unlock Your Security Potential

14 Nov 2023

November 14, 2023

Beyond Identity's Zero Trust Assessment Tool: Unlock Your Security Potential

The new tool assesses your organization's current security environment by focusing on two critical aspects: identity verification and device compliance.

Announcements
Beyond Identity's Zero Trust Assessment Tool: Unlock Your Security Potential
Announcing: Okta Defense Kit

03 Nov 2023

November 3, 2023

Announcing: Okta Defense Kit

Free, privacy-preserving tools to rapidly determine whether your Okta instance is compromised and optimize overall Okta configuration security so you never have to wonder if you’ve been Okta Pwned.

Announcing: Okta Defense Kit
Beyond Identity Was Not Impacted by the Recent Okta Security Incident

26 Oct 2023

October 26, 2023

Beyond Identity Was Not Impacted by the Recent Okta Security Incident

We conclusively determined that our environment was not compromised and no Beyond Identity customers were impacted.

Beyond Identity Was Not Impacted by the Recent Okta Security Incident
A Clear Path Forward with Okta’s HAR File Challenges

24 Oct 2023

October 24, 2023

A Clear Path Forward with Okta’s HAR File Challenges

Okta recommends sanitizing HAR files but stops short of providing a precise method for doing so. But worry not, Beyond Identity has risen to the occasion.

Thought Leadership
A Clear Path Forward with Okta’s HAR File Challenges
Four Ways to Make Quick Gains in Zero Trust Maturity

12 Oct 2023

October 12, 2023

Four Ways to Make Quick Gains in Zero Trust Maturity

CIOs and CISOs need to lead their organizations toward a pragmatic and structured approach, like the one outlined by CISA’s Zero Trust Maturity Model.

Technical Deep Dive
Four Ways to Make Quick Gains in Zero Trust Maturity
For Developers: What's Beyond Identity?

14 Sep 2023

September 14, 2023

For Developers: What's Beyond Identity?

Better sign on Beyond Identity provides you, the developer, with passkey-based sign on for your web or native mobile app. For your users that...

For Developers: What's Beyond Identity?
FIDO2 vs. WebAuthn: What’s the Difference?

13 Sep 2023

September 13, 2023

FIDO2 vs. WebAuthn: What’s the Difference?

Explore FIDO2 and WebAuthn to understand their differences and choose the protocol that aligns best with your use cases.

FIDO2 vs. WebAuthn: What’s the Difference?
FIDO2 vs. U2F: What’s the Difference?

13 Sep 2023

September 13, 2023

FIDO2 vs. U2F: What’s the Difference?

Passwords are easily guessed and easily stolen, making them the leading cause of security breaches. This is common knowledge at this point.

FIDO2 vs. U2F: What’s the Difference?