BreachHQ
A free and open database of security incidents to stay on top of what's going on in security.
![Breach-hq logo](https://cdn.prod.website-files.com/657335d32052e5f1b9570244/667c9c122b305e07ee5dabc0_Union.png)
Phishing 101
Explore our collection of phishing exploits on legacy MFA. We regularly check these exploits to ensure they are up to date.
![](https://cdn.prod.website-files.com/657335d32052e5f1b9570244/662d79a9d3b7caa0f77ef01d_lc-hero-box1.png)
Okta Defense Kit
Identify and prevent security vulnerabilities, including those that contributed to recent Okta breaches, with this pair of free tools.
![](https://cdn.prod.website-files.com/657335d32052e5f1b9570244/662d724b72cfd93d913f4037_lc-hero-box2.png)
What is Credential Stuffing?
Credential stuffing can be detrimental and difficult to prevent, but luckily we’ve put together some points for how to prevent it.
![](https://cdn.prod.website-files.com/657335d32052e5f1b9570244/662d79a95fc2be5c38415ceb_lc-hero-box3.png)
Cyber Workbench
Knowledge-based tools to help you learn, understand, and fortify your
organization's cybersecurity.
Learn with a human
Book a 15-minute chat with a Beyond Identity engineer to get support, ideas, and answers to any of your questions.
Book your time![](https://cdn.prod.website-files.com/657335d32052e5f1b9570244/662c3db135278ae450e61f5e_resource-tile01-graphic.png)
Phishing 101
Our extensive glossary and demos on all things phishing-related, including advanced phishing topics.
![](https://cdn.prod.website-files.com/657335d32052e5f1b9570244/662be41fc2029bda99e8cc5d_resource-tile02.png)
Phishing Kill Chain Analysis
Explore step-by-step how a phishing attack is carried out and what you can do to defend against them.
![](https://cdn.prod.website-files.com/657335d32052e5f1b9570244/6631549ed4f514011cda09c4_resource-tile03.png)
Zero Trust Assessment
Evaluate where your organization is from a zero trust perspective and begin mapping out your zero trust journey.
![](https://cdn.prod.website-files.com/657335d32052e5f1b9570244/6631549ee55192b28de9e7b0_resource-tile04.png)
Okta Defense Kit
In response to Okta breaches, we’re offering two free tools to help you understand if your organization has been impacted.
![](https://cdn.prod.website-files.com/657335d32052e5f1b9570244/6631549e577d1484fc424895_resource-tile05.png)
The Passkey Journey
Discover, design, and deploy passwordless experiences tailored to your users. Get custom insights, preview user experiences, and ready-to-use SDKs -- all in one place.
![](https://cdn.prod.website-files.com/657335d32052e5f1b9570244/6631549e69a6184cbcf49339_resource-tile06.png)
Glossary
Get detailed definitions of key access security terms and concepts.
Identity & Authentication
Adaptive Authentication
Attacks
Attack Surface
Attacks
Brute Force Attack
Attacks
Credential Stuffing
Attacks
Dictionary Attack
Identity & Authentication
FIDO2
Identity & Authentication
Federated Identity Management
Identity & Authentication
Identity as a Service (IDaaS)
Attacks
Insider Threats
Attacks
Keystroke Logging
Attacks
Lateral Movement
Identity & Authentication
Magic Links
Attacks
Man in the Middle Attack
Identity & Authentication
One-Time Passwords (OTPs)
Identity & Authentication
Out-of-Band Authentication
Attacks