Stay up to date on the latest at Beyond Identity

Cybersecurity Leadership: What's Your 180-Day Plan?
Business and security leaders accept that a hybrid workforce is the new norm - some staff members based in a central office and many others permanently working at home. But what new cybersecurity demands does this strategy present short-term and into 2021? Our expert panel shares insights.

Cloud professionals ‘overly attached to password-based security’
Most cloud professionals remain overly attached to the use of passwords despite their inherent security vulnerabilities, value as a target for threat actors, and widespread frustrations around password hygiene requirements, according to research conducted by Beyond Identity.

Cloud professionals cling to their passwords despite the risks
A study of over 150 people carried out by Beyond Identity reveals 60% find it frustrating to remember multiple passwords, 52% percent are frustrated by having to regularly change their passwords, and 52% by the requirement to choose long passwords containing numbers and symbols.

COVID-19's Acceleration of Cloud Migration & Identity-Centric Security
Here are some tips for updating access control methods that accommodate new remote working norms without sacrificing security.

Cloud professionals remain attached to password security
Beyond Identity, MFA company, has released the findings of new industry research, into password security vulnerabilities.

Cloud Identity Is ‘New Normal’ Replacement for On-Prem Tools
With the rise of work-from-home, SaaS, IoT, cloud, mobile and edge computing, the traditional on-premises identity and authentication systems are becoming obsolete, giving way to cloud identity.

Beyond Trust, Cybersecurity Companies Launch Zero Trust … – TechDecisions
Passwordless authentication software provider Beyond Identity is launching Zero Trust Authentication, a new subcategory of zero trust technology designed to help organizations move towards secure authentication that advances the zero trust security movement.

British Cyber Security - The Next Threats Call For Action
“The bottom line is you can't have truly effective security if you are using passwords, which for most organisations is still the case,” argues Jasson Casey, CTO at Beyond Identity.