Navigating the Path to Enhanced Authentication

Navigating the Path to Enhanced Authentication

| | Authentication
On the surface, authentication sounds simple – your goal as a security executive is to... The post Navigating the Path to Enhanced Authentication appeared first on Axiad ... Read More

Don’t Let Underlying IT Complexity Block Your Road to Successful Authentication

| | research
We asked, and more than 250 of you answered. Survey says: it’s complicated! Our recent... The post Don’t Let Underlying IT Complexity Block Your Road to Successful Authentication appeared first on Axiad ... Read More

The Arrival of “Big Mo” at Axiad

| | Announcements
One of my favorite conceptual terms is “Big Mo.”  This term, which is borrowed from... The post The Arrival of “Big Mo” at Axiad appeared first on Axiad ... Read More

Rethinking Enterprise Authentication – A Practitioner Point of View

| | Announcements
Authentication is a core element of a modern cybersecurity strategy, and how this critical process... The post Rethinking Enterprise Authentication – A Practitioner Point of View appeared first on Axiad ... Read More
Certificate-Based Authentication

3 Key Use Cases for Certificate-Based Authentication

| | Authentication
Trends Favor Certificates Certificate-based authentication has been around for a while, but more organizations are... The post 3 Key Use Cases for Certificate-Based Authentication appeared first on Axiad ... Read More
Best Passwordless Authentication Solution

Why the Best Passwordless Authentication Solution Must Be a Unified One

| | Authentication
There are many reasons why the best passwordless authentication solution must be a unified one.... The post Why the Best Passwordless Authentication Solution Must Be a Unified One appeared first on Axiad ... Read More
5 Current Challenges of Identity Governance and Administration

5 Current Challenges of Identity Governance and Administration

| | Authentication
The increased digitization of enterprise settings means that organizations have more devices, data, and users... The post 5 Current Challenges of Identity Governance and Administration appeared first on Axiad ... Read More
FIDO and FIDO 2 Passwordless

A Guide to FIDO Passwordless Authentication

| | Authentication
A recent report from IBM notes that the most popular attack vector for hackers is... The post A Guide to FIDO Passwordless Authentication appeared first on Axiad ... Read More
KuppingerCole Highlights Axiad as a Top Passwordless Authentication Provider

KuppingerCole Highlights Axiad as a Top Passwordless Authentication Provider

| | research
KuppingerCole Highlights Axiad as a Top Passwordless Authentication Provider The post KuppingerCole Highlights Axiad as a Top Passwordless Authentication Provider appeared first on Axiad ... Read More
Identity is the Key to SaaS Security, and You Need a Better Lock

Identity is the Key to SaaS Security, and You Need a Better Lock

| | Fresh Takes
Recent hacks at Uber, American Airlines and Rockstar Games (makers of Grand Theft Auto) have attributed their breaches to well-known attack vectors that exploit known weaknesses in multi-factor authentication (MFA). In this blog, we’ll look at how identity provides the key and what locks are available to move towards better ... Read More