The Beyond Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Is it finally time to kill traditional Two-Factor Authentication and Multi-Factor Authentication?

11 Feb 2021

February 11, 2021

Is it finally time to kill traditional Two-Factor Authentication and Multi-Factor Authentication?

The traditional two-factor or multi-factor authentication solutions that companies are currently using can and should be replaced by something that is far more secure and much easier to use.

Thought Leadership
Is it finally time to kill traditional Two-Factor Authentication and Multi-Factor Authentication?
Here Are Some of the Ways They Stole Passwords in 2020

12 Jan 2021

January 12, 2021

Here Are Some of the Ways They Stole Passwords in 2020

Here we’ll present the notable methods – some old, and some new – that hackers used to steal passwords in 2020.

Here Are Some of the Ways They Stole Passwords in 2020
5 ways to check if any of your employees’ passwords have been leaked or reused

23 Dec 2020

December 23, 2020

5 ways to check if any of your employees’ passwords have been leaked or reused

If you really have to use passwords, then here are some tips to lessen the considerable security risks that they pose.

5 ways to check if any of your employees’ passwords have been leaked or reused
Rolling out passwordless just got easier

17 Dec 2020

December 17, 2020

Rolling out passwordless just got easier

We’ve made three enhancements to our passwordless identity platform to help the transition to a new authentication method even easier.

Technical Deep Dive
Rolling out passwordless just got easier
How Your MFA Can Be Hacked (With Examples)

09 Dec 2020

December 9, 2020

How Your MFA Can Be Hacked (With Examples)

For a hacker, these MFA solutions, which include one-time codes, SMS-confirmation, mobile push notifications and “security” based questions, are equivalent to protecting a screen door with another screen door.

Thought Leadership
How Your MFA Can Be Hacked (With Examples)
The Things You Wanted to Know About Beyond Identity, But Were Afraid to Ask

25 Nov 2020

November 25, 2020

The Things You Wanted to Know About Beyond Identity, But Were Afraid to Ask

Here is a running list of frequent questions we get about Beyond Identity and how we eliminate passwords.

Thought Leadership
The Things You Wanted to Know About Beyond Identity, But Were Afraid to Ask
Announcing Beyond Identity’s new integration with Microsoft ADFS

18 Nov 2020

November 18, 2020

Announcing Beyond Identity’s new integration with Microsoft ADFS

There’s a large base of Microsoft ADFS customers that wanted passwordless authentication for their workforce, and now they can get that and more granular access controls.

Announcements
Technical Deep Dive
Announcing Beyond Identity’s new integration with Microsoft ADFS
If Not Passwords, Then What?

19 Oct 2020

October 19, 2020

If Not Passwords, Then What?

Passwords are a pain, they’re both a massive security risk and an operational inconvenience for admins and users alike, but when we eliminate passwords, what do we replace them with?

Thought Leadership
If Not Passwords, Then What?
PIN Code vs Password: Which is More Secure?

03 Sep 2020

September 3, 2020

PIN Code vs Password: Which is More Secure?

The reasons why your 4-digit PIN code is more secure than your 12-character password.

Thought Leadership
PIN Code vs Password: Which is More Secure?