The Beyond Blog

12 Aug 2025
Introducing the New Beyond Identity: Dare to Do Identity Differently
Beyond Identity unveils a bold new brand — reflecting the only platform built to eliminate identity-based threats.
.jpeg)
16 Nov 2022
November 16, 2022
What is OAuth 2.0?
If you're reading this, chances are good that you've used OAuth 2.0 without even knowing it. It's the protocol that powers logins for some of the largest sites and services on the web, including Google, Facebook, and Twitter.
.jpeg)
16 Nov 2022
November 16, 2022
What is OIDC?
OIDC stands for OpenID Connect. It's a standard for authentication that is built on top of the existing OAuth 2.0 framework.

16 Nov 2022
November 16, 2022
10 Organizations That Suffered Massive Data Breaches in 2022
Beyond Identity collected information about some of the largest, unique, and most high profile data breaches to wreak havoc on organizations in 2022.

15 Nov 2022
November 15, 2022
Drizly FTC Verdict Could Set New Precedent for CEOs
The FTC decision against Drizly sets a new precedent. Security breaches could now have career-long implications for CEOs.

14 Nov 2022
November 14, 2022
Hacker Tracker: November 2022
Read Hacker Tracker each month to learn about recent, high-profile cyberattacks.

10 Nov 2022
November 10, 2022
MFA and Autofill Security and Vulnerability
MFA requires repeatedly entering information which can annoy users. How many use MFA and have been victims of an MFA fatigue attack?

28 Oct 2022
October 28, 2022
The MFA Emergency and the Changing Status Quo
Phishing-resistant MFA is no longer an option, it’s a necessity. Choosing to implement MFA correctly now could save your organization in the future.

27 Oct 2022
October 27, 2022
Hacker Tracker: October 2022
Learn about the most significant recent attacks, which vulnerabilities were exploited by the hackers, and what the fallout has been.

24 Oct 2022
October 24, 2022
What Developers Need to Know About Multi-Factor Authentication
Developers are always looking for ways to make users' lives easier. But when it comes to security, sometimes making things easier for users can have the opposite effect. Take multi-factor authentication (MFA), for example. Requiring users to jump through the extra hoop of a second factor is often detrimental to the user experience but improves the security of your application.