The Beyond Blog

08 Dec 2025
The Hacker News Webinar: Winning the AI Arms Race
See why AI-generated phishing has become indistinguishable from real email and how organizations are shutting it down with deterministic, device-verified access.

22 Nov 2023
November 22, 2023
Okta Breach Timeline: Breaking Down the Hacks
Okta's story the last two years highlights the urgent need for stronger defenses against vulnerabilities. Review the Okta breach timeline for insights.

14 Nov 2023
November 14, 2023
Beyond Identity's Zero Trust Assessment Tool: Unlock Your Security Potential
The new tool assesses your organization's current security environment by focusing on two critical aspects: identity verification and device compliance.

03 Nov 2023
November 3, 2023
Announcing: Okta Defense Kit
Free, privacy-preserving tools to rapidly determine whether your Okta instance is compromised and optimize overall Okta configuration security so you never have to wonder if you’ve been Okta Pwned.

26 Oct 2023
October 26, 2023
Beyond Identity Was Not Impacted by the Recent Okta Security Incident
We conclusively determined that our environment was not compromised and no Beyond Identity customers were impacted.

24 Oct 2023
October 24, 2023
A Clear Path Forward with Okta’s HAR File Challenges
Okta recommends sanitizing HAR files but stops short of providing a precise method for doing so. But worry not, Beyond Identity has risen to the occasion.

12 Oct 2023
October 12, 2023
Four Ways to Make Quick Gains in Zero Trust Maturity
CIOs and CISOs need to lead their organizations toward a pragmatic and structured approach, like the one outlined by CISA’s Zero Trust Maturity Model.

14 Sep 2023
September 14, 2023
For Developers: What's Beyond Identity?
Better sign on Beyond Identity provides you, the developer, with passkey-based sign on for your web or native mobile app. For your users that...

13 Sep 2023
September 13, 2023
FIDO2 vs. WebAuthn: What’s the Difference?
Explore FIDO2 and WebAuthn to understand their differences and choose the protocol that aligns best with your use cases.

13 Sep 2023
September 13, 2023
FIDO2 vs. U2F: What’s the Difference?
Passwords are easily guessed and easily stolen, making them the leading cause of security breaches. This is common knowledge at this point.