The Beyond Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Passwordless E-Commerce: Make the Checkout Experience Enjoyable

30 Jun 2022

June 30, 2022

Passwordless E-Commerce: Make the Checkout Experience Enjoyable

How can you make it easy for online shoppers to spend their hard-earned money? By providing a passwordless e-commerce experience.

Passwordless E-Commerce: Make the Checkout Experience Enjoyable
Data Breaches are More Costly for These 10 Industries

28 Jun 2022

June 28, 2022

Data Breaches are More Costly for These 10 Industries

Beyond Identity collected data from the IBM Security’s Cost of a Data Breach Report 2021 to identify 10 industries where data breaches are the most costly.

Breach Analysis
Data Breaches are More Costly for These 10 Industries
Secure Your Repo Access & Code Commits with GitLab and Beyond Identity

27 Jun 2022

June 27, 2022

Secure Your Repo Access & Code Commits with GitLab and Beyond Identity

Beyond Identity and GitLab are addressing the weakness created by implicit trust placed in the software supply chains.

Announcements
Secure Your Repo Access & Code Commits with GitLab and Beyond Identity
Top Trends and Topics Coming Out of the RSA and Gartner Conferences

16 Jun 2022

June 16, 2022

Top Trends and Topics Coming Out of the RSA and Gartner Conferences

Here are some of the most popular topics that came out of RSA and Gartner conferences, where the top cybersecurity professionals gathered.

Thought Leadership
Top Trends and Topics Coming Out of the RSA and Gartner Conferences
Putting the “Continuous” in Continuous Authentication

07 Jun 2022

June 7, 2022

Putting the “Continuous” in Continuous Authentication

We made our Continuous Risk-Based Authentication capability generally available, making “continuous authentication” actually continuous.

Announcements
Putting the “Continuous” in Continuous Authentication
History of Online Security, from CAPTCHA to Multi-Factor Authentication

31 May 2022

May 31, 2022

History of Online Security, from CAPTCHA to Multi-Factor Authentication

Beyond Identity covers the history of cybersecurity, from the first antivirus program to the rise of two-factor authentication.

Thought Leadership
History of Online Security, from CAPTCHA to Multi-Factor Authentication
What to Know From the 2022 Verizon Data Breach Investigations Report (DBIR)

25 May 2022

May 25, 2022

What to Know From the 2022 Verizon Data Breach Investigations Report (DBIR)

The 2022 Verizon DBIR is full of insights and data about the current state of cybersecurity. Here are the top five takeaways you need to know.

Thought Leadership
What to Know From the 2022 Verizon Data Breach Investigations Report (DBIR)
Why the GitHub 2023 2FA Mandate isn't Enough

17 May 2022

May 17, 2022

Why the GitHub 2023 2FA Mandate isn't Enough

This 2FA initiative from GitHub is designed to improve the overall security of the software supply chain, but it doesn’t go far enough.

Why the GitHub 2023 2FA Mandate isn't Enough
NIST and Passwordless Solutions: Meeting Compliance Needs

11 May 2022

May 11, 2022

NIST and Passwordless Solutions: Meeting Compliance Needs

The truth is that passwordless authentication is NIST 800-63 compliant and a much better solution than simply improving your password policies.

Compliance
NIST and Passwordless Solutions: Meeting Compliance Needs