passwordless authentication

Navigating the path to passwordless authentication

| | Authentication
Yves Audebert is chairman, president and co-CEO of Axiad IDS, a trusted identity solutions provider... The post Navigating the path to passwordless authentication appeared first on Axiad ... Read More
Lessons Learned from the Cisco Data Breach

Lessons Learned from the Cisco Data Breach

| | Fresh Takes
Cisco’s Talos security intelligence team recently shared details on how an employee’s account was breached... The post Lessons Learned from the Cisco Data Breach appeared first on Axiad ... Read More
Certificate-Based Authentication

How Does Certificate-Based Authentication Work?

| | Authentication
Certificate-based authentication is an authentication mechanism that verifies a user’s or device’s identity using digital... The post How Does Certificate-Based Authentication Work? appeared first on Axiad ... Read More
CISA Zero-trust Maturity Model

CISA Zero-trust Maturity Model – Takeaways from the White House OMB Memo

| | Compliance
The White House, along with CISA, is taking action to improve security models. In particular,... The post CISA Zero-trust Maturity Model – Takeaways from the White House OMB Memo appeared first on Axiad ... Read More
What is FIDO2 Authentication

What is FIDO2 Authentication and How Does It Work?

| | Authentication
FIDO2 authentication is a relatively new way to authenticate users online. Instead of using a... The post What is FIDO2 Authentication and How Does It Work? appeared first on Axiad ... Read More
Microsoft Azure AD Security

10 Best Practices for Microsoft Azure AD Security: An In-Depth Guide

| | Fresh Takes
Every day, the world of cybersecurity becomes more complicated. Platforms like Microsoft Azure AD Security... The post 10 Best Practices for Microsoft Azure AD Security: An In-Depth Guide appeared first on Axiad ... Read More
Passwordless authentication

What Is Passwordless Authentication and How Does It Work?

| | Authentication
At first, passwordless authentication seems like a radical idea. But you’re probably already using it.... The post What Is Passwordless Authentication and How Does It Work? appeared first on Axiad ... Read More
How to Implement Zero Trust in Your Business

How to Implement Zero Trust in Your Business

| | Fresh Takes
When it comes to data security, the term “zero trust” is becoming more and more... The post How to Implement Zero Trust in Your Business appeared first on Axiad ... Read More
Tips for Hybrid and Remote Work Security

10 Tips for Hybrid and Remote Work Security

| | Fresh Takes
Hybrid and remote work is on the rise, leaving many companies to shore up their... The post 10 Tips for Hybrid and Remote Work Security appeared first on Axiad ... Read More
Automating 2-Factor Authentication

Why Is Automating 2-Factor Authentication Important?

| | Authentication
2-factor authentication is important because it adds an extra layer of security to your online... The post Why Is Automating 2-Factor Authentication Important? appeared first on Axiad ... Read More