Xfinity Data Breach

Xfinity Data Breach: How It Happened (and Are You Affected?)

| | security bulletin
Cable customers weren’t thrilled when they realized that Comcast would implement yet another price hike.... The post Xfinity Data Breach: How It Happened (and Are You Affected?) appeared first on Axiad ... Read More
2022 Data Breaches

2022 Data Breaches: What Happened and What Did We Learn?

| | security bulletin
Data breaches are an unfortunate reality in today’s digital world, where businesses of all sectors... The post 2022 Data Breaches: What Happened and What Did We Learn? appeared first on Axiad ... Read More
lastpass hacked

What the LastPass Hack Says About Modern Cybersecurity

| | security bulletin
Online password managers are meant to help users keep track of the long and complex... The post What the LastPass Hack Says About Modern Cybersecurity appeared first on Axiad ... Read More
How Does Azure AD Certificate-Based Authentication Work?

How Does Azure AD Certificate-Based Authentication Work?

| | Authentication
Azure AD certificate-based authentication (CBA) is an authentication method that lets you, as a business,... The post How Does Azure AD Certificate-Based Authentication Work? appeared first on Axiad ... Read More
MFA Fatigue Attacks

The Growing Problem with MFA Fatigue Attacks (And What You Can Do About It)

| | Fresh Takes
The internet is threatened more than ever by people who want nothing more than to... The post The Growing Problem with MFA Fatigue Attacks (And What You Can Do About It) appeared first on Axiad ... Read More
Federated Authentication vs. SSO: What’s the Difference?

Federated Authentication vs. SSO: What’s the Difference?

| | Authentication
If you’ve ever deployed a new application for your organization, you know first-hand the grumbling... The post Federated Authentication vs. SSO: What’s the Difference? appeared first on Axiad ... Read More
Twitter's Authentication

Twitter’s Authentication Nightmare

| | Authentication
If you’ve been on the internet at all over the past few weeks, you’ve heard... The post Twitter’s Authentication Nightmare appeared first on Axiad ... Read More
How Hackers Are Bypassing MFA

Microsoft’s Warning About How Hackers Are Bypassing MFA – What You Need to Know

| | Authentication
With many companies shifting to multi-factor authentication (MFA) for verifying users, hackers have had to... The post Microsoft’s Warning About How Hackers Are Bypassing MFA – What You Need to Know appeared first on Axiad ... Read More
What is CBA Cybersecurity

Why is CBA Hot Right Now?

| | Authentication
Passwords have long been a source of frustration for IT security personnel. They’re easily forgotten,... The post Why is CBA Hot Right Now? appeared first on Axiad ... Read More
What If I Lose My Yubikey

What If I Lose My Yubikey or Google Authenticator?

| | Authentication
2FA (two-factor authentication) is a great way to protect accounts. If you’re trying to secure... The post What If I Lose My Yubikey or Google Authenticator? appeared first on Axiad ... Read More

Secure Guardrails