Stay up to date on the latest at Beyond Identity

Zero Trust Authentication (ZTA) promises a password-less future
Jasson Casey, CTO, Beyond Identity, discusses the company’s development of Zero Trust Authentication, which looks set to be a key component of a wider, truly optimised enterprise Zero Trust Security solution.

World Password Day: Experts Share Best Practices For Avoiding Password Pain
Jasson Casey, CTO at Beyond Identity says organisations “can switch to a modern, secure, phishing-resistant MFA that leverages the combination of biometrics and Passkeys based on the Fast Identity Online (FIDO) standards."

Zero Trust Authentication: 7 key principles of the new security concept
Jasson Casey, CTO at Beyond Identity, outlines Zero Trust Authentication – a brand-new concept that seeks to revolutionise how we think about the relationship between authentication and security.

Zero trust rated as highly effective by businesses worldwide
Zero trust is here to stay, with 82% of experts currently working on implementing zero trust, and 16% planning to begin within 18 months, according to Beyond Identity.

Why traditional multi-factor authentication doesn't provide a safety net
"Transitioning to a Zero Trust strategy should be a high priority for organizations to adequately defend against the tide of cyberattacks. The introduction of a Zero Trust authentication solution is an important starting point for this," writes Chris Meidinger, Technical Director, EMEA, Beyond Identity

Why isn't Zero Trust Authentication already a thing?
Jasson Casey, CTO at Beyond Identity, explains why companies should employ a zero trust authentication solution to take pressure of employees and render stolen credentials and MFA bypass attacks useless.

Why are professionals remaining overly attached to password-based security despite growing risks and widespread frustration?
Beyond Identity has released the findings of new industry research that indicates most cloud professionals remain overly attached to passwords despite their inherent security vulnerabilities and the widespread frustrations around password hygiene requirements.

Widespread Brute-Force Attacks Tied to Russia’s APT28
The ongoing attacks are targeting cloud services such as Office 365 to steal passwords and password-spray a vast range of targets, including in U.S. and European governments and military.