The Beyond Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Secure Your Repo Access & Code Commits with GitLab and Beyond Identity

27 Jun 2022

June 27, 2022

Secure Your Repo Access & Code Commits with GitLab and Beyond Identity

Beyond Identity and GitLab are addressing the weakness created by implicit trust placed in the software supply chains.

Announcements
Secure Your Repo Access & Code Commits with GitLab and Beyond Identity
Top Trends and Topics Coming Out of the RSA and Gartner Conferences

16 Jun 2022

June 16, 2022

Top Trends and Topics Coming Out of the RSA and Gartner Conferences

Here are some of the most popular topics that came out of RSA and Gartner conferences, where the top cybersecurity professionals gathered.

Thought Leadership
Top Trends and Topics Coming Out of the RSA and Gartner Conferences
Putting the “Continuous” in Continuous Authentication

07 Jun 2022

June 7, 2022

Putting the “Continuous” in Continuous Authentication

We made our Continuous Risk-Based Authentication capability generally available, making “continuous authentication” actually continuous.

Announcements
Putting the “Continuous” in Continuous Authentication
History of Online Security, from CAPTCHA to Multi-Factor Authentication

31 May 2022

May 31, 2022

History of Online Security, from CAPTCHA to Multi-Factor Authentication

Beyond Identity covers the history of cybersecurity, from the first antivirus program to the rise of two-factor authentication.

Thought Leadership
History of Online Security, from CAPTCHA to Multi-Factor Authentication
What to Know From the 2022 Verizon Data Breach Investigations Report (DBIR)

25 May 2022

May 25, 2022

What to Know From the 2022 Verizon Data Breach Investigations Report (DBIR)

The 2022 Verizon DBIR is full of insights and data about the current state of cybersecurity. Here are the top five takeaways you need to know.

Thought Leadership
What to Know From the 2022 Verizon Data Breach Investigations Report (DBIR)
Why the GitHub 2023 2FA Mandate isn't Enough

17 May 2022

May 17, 2022

Why the GitHub 2023 2FA Mandate isn't Enough

This 2FA initiative from GitHub is designed to improve the overall security of the software supply chain, but it doesn’t go far enough.

Why the GitHub 2023 2FA Mandate isn't Enough
NIST and Passwordless Solutions: Meeting Compliance Needs

11 May 2022

May 11, 2022

NIST and Passwordless Solutions: Meeting Compliance Needs

The truth is that passwordless authentication is NIST 800-63 compliant and a much better solution than simply improving your password policies.

Compliance
NIST and Passwordless Solutions: Meeting Compliance Needs
Why Your MFA Is Insecure

04 May 2022

May 4, 2022

Why Your MFA Is Insecure

Using multiple insecure authentication mechanisms provides little security and many MFA solutions today still leave companies vulnerable to attack.

Thought Leadership
Why Your MFA Is Insecure
Countries With the Most—and Least—Digital Freedom

29 Apr 2022

April 29, 2022

Countries With the Most—and Least—Digital Freedom

Beyond Identity compiled data from Freedom House’s 2021 Freedom on the Net report to rank the countries with the most and least digital freedom.

Thought Leadership
Countries With the Most—and Least—Digital Freedom