The Beyond Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sneaky 2FA: Dangerous New Threat Targeting Microsoft 365

23 Jan 2025

January 23, 2025

Sneaky 2FA: Dangerous New Threat Targeting Microsoft 365

Sneaky 2FA is the latest phishing-as-a-service kit targeting Microsoft 365. Learn more about their exploit techniques and how to defend against them.

Breach Analysis
Sneaky 2FA: Dangerous New Threat Targeting Microsoft 365
Elevating Federal Cybersecurity: New Executive Order Prioritizes Phishing-Resistant Authentication for Federal Agencies

16 Jan 2025

January 16, 2025

Elevating Federal Cybersecurity: New Executive Order Prioritizes Phishing-Resistant Authentication for Federal Agencies

Learn more about the executive order issued in January 2025 on Strengthening and Promoting Innovation in the Nation’s Cybersecurity

Thought Leadership
Elevating Federal Cybersecurity: New Executive Order Prioritizes Phishing-Resistant Authentication for Federal Agencies
Beyond Identity Signs Reseller Agreement with MKI

16 Jan 2025

January 16, 2025

Beyond Identity Signs Reseller Agreement with MKI

Beyond Identity expands to Japan with Mitsui Knowledge Industry (MKI). Learn more about our partnership

Announcements
Beyond Identity Signs Reseller Agreement with MKI
Beyond Identity’s Investment in Identity Standards: IPSIE

14 Jan 2025

January 14, 2025

Beyond Identity’s Investment in Identity Standards: IPSIE

Investing in Identity Standards: Enabling secure by design enterprise identity systems through the IPSIE working group.

Announcements
Beyond Identity’s Investment in Identity Standards: IPSIE
OIDC vs. SAML: Understanding the Differences and Upgrading to Modern Authentication

13 Jan 2025

January 13, 2025

OIDC vs. SAML: Understanding the Differences and Upgrading to Modern Authentication

Learn the differences between SAML and OIDC, why OIDC is the modern choice, and how to upgrade your authentication for a secure, seamless user experience.

Thought Leadership
OIDC vs. SAML: Understanding the Differences and Upgrading to Modern Authentication
Beyond Identity Launches New Channel Program to Accelerate Partner Business Growth

09 Jan 2025

January 9, 2025

Beyond Identity Launches New Channel Program to Accelerate Partner Business Growth

The launch of our channel program signifies our commitment to a partner-first strategy

Announcements
Beyond Identity Launches New Channel Program to Accelerate Partner Business Growth
Beyond Identity Expands CrowdStrike Integration to Enforce Real-Time Access Decisions with Comprehensive Risk Attributes

06 Jan 2025

January 6, 2025

Beyond Identity Expands CrowdStrike Integration to Enforce Real-Time Access Decisions with Comprehensive Risk Attributes

The Beyond Identity integrations leverage CrowdStrike’s world-class threat detection and response capabilities to enhance preventive measures.

Announcements
Beyond Identity Expands CrowdStrike Integration to Enforce Real-Time Access Decisions with Comprehensive Risk Attributes
BeyondTrust incident does not impact Beyond Identity

31 Dec 2024

December 31, 2024

BeyondTrust incident does not impact Beyond Identity

Recent potential incident involving BeyondTrust: unrelated and does not impact Beyond Identity and our customers.

Announcements
BeyondTrust incident does not impact Beyond Identity
AuthQuake: A New Brute Force Attack on Microsoft MFA

20 Dec 2024

December 20, 2024

AuthQuake: A New Brute Force Attack on Microsoft MFA

AuthQuake is a newly discovered vulnerability that exploits weaknesses in Microsoft's MFA implementation. Learn more about what it is and how to defend against it

Breach Analysis
AuthQuake: A New Brute Force Attack on Microsoft MFA