
Navigating the path to passwordless authentication
Yves Audebert is chairman, president and co-CEO of Axiad IDS, a trusted identity solutions provider... The post Navigating the path to passwordless authentication appeared first on Axiad ... Read More

Lessons Learned from the Cisco Data Breach
Cisco’s Talos security intelligence team recently shared details on how an employee’s account was breached... The post Lessons Learned from the Cisco Data Breach appeared first on Axiad ... Read More

How Does Certificate-Based Authentication Work?
Certificate-based authentication is an authentication mechanism that verifies a user’s or device’s identity using digital... The post How Does Certificate-Based Authentication Work? appeared first on Axiad ... Read More

CISA Zero-trust Maturity Model – Takeaways from the White House OMB Memo
The White House, along with CISA, is taking action to improve security models. In particular,... The post CISA Zero-trust Maturity Model – Takeaways from the White House OMB Memo appeared first on Axiad ... Read More

What is FIDO2 Authentication and How Does It Work?
FIDO2 authentication is a relatively new way to authenticate users online. Instead of using a... The post What is FIDO2 Authentication and How Does It Work? appeared first on Axiad ... Read More

10 Best Practices for Microsoft Azure AD Security: An In-Depth Guide
Every day, the world of cybersecurity becomes more complicated. Platforms like Microsoft Azure AD Security... The post 10 Best Practices for Microsoft Azure AD Security: An In-Depth Guide appeared first on Axiad ... Read More

What Is Passwordless Authentication and How Does It Work?
At first, passwordless authentication seems like a radical idea. But you’re probably already using it.... The post What Is Passwordless Authentication and How Does It Work? appeared first on Axiad ... Read More

How to Implement Zero Trust in Your Business
When it comes to data security, the term “zero trust” is becoming more and more... The post How to Implement Zero Trust in Your Business appeared first on Axiad ... Read More

10 Tips for Hybrid and Remote Work Security
Hybrid and remote work is on the rise, leaving many companies to shore up their... The post 10 Tips for Hybrid and Remote Work Security appeared first on Axiad ... Read More

Why Is Automating 2-Factor Authentication Important?
2-factor authentication is important because it adds an extra layer of security to your online... The post Why Is Automating 2-Factor Authentication Important? appeared first on Axiad ... Read More