A Wave of Identity Security Reports Defines a Big Problem
There have been a wealth of reports lately articulating the poor state of identity risk.... The post A Wave of Identity Security Reports Defines a Big Problem appeared first on Axiad ...
Today’s “Good Enough MFA” Should Be Phishing-Resistant
In today’s world, we can’t escape the daily headlines about data breaches, hacks, and cyberattacks.... The post Today’s “Good Enough MFA” Should Be Phishing-Resistant appeared first on Axiad ...

Q&A With Axiad’s New CFO: Brian Szeto
Background & Role Earlier this month, we announced Brian Szeto as our new CFO. With... The post Q&A With Axiad’s New CFO: Brian Szeto appeared first on Axiad ...
New CJIS Security Policy Changes the Game for MFA for Criminal Justice Organizations
Criminal Justice Information Services (CJIS), a division of the FBI that collects, stores, and shares... The post New CJIS Security Policy Changes the Game for MFA for Criminal Justice Organizations appeared first ...
Axiad Takes a Leading Role in Microsoft’s FIDO Provisioning API Upgrade
At Axiad, we said a year ago that FIDO passkeys would likely become the gold... The post Axiad Takes a Leading Role in Microsoft’s FIDO Provisioning API Upgrade appeared first on Axiad ...
Partner Spotlight: Streamlining Authentication at Scale With IDEMIA
Axiad and IDEMIA have been trusted partners in the identity-security space for almost a decade,... The post Partner Spotlight: Streamlining Authentication at Scale With IDEMIA appeared first on Axiad ...

Is Your MFA Broken?
Multifactor authentication (MFA) has formally been around for more than two decades, gaining the most... The post Is Your MFA Broken? appeared first on Axiad ...
Partner Spotlight: The Power of Axiad and Yubico
Axiad and Yubico have a long-standing partnership, delivering trusted solutions to millions of users worldwide... The post Partner Spotlight: The Power of Axiad and Yubico appeared first on Axiad ...

An Identity Love Story: Hardware vs Software Security Tokens
Identity Security Cybersecurity has been growing since the first computer was created. And it is... The post An Identity Love Story: Hardware vs Software Security Tokens appeared first on Axiad ...

Identity Gaps: The Need to Use Both x.509 & FIDO
Over the last month, several large organizations suffered from major cybersecurity breaches involving stolen credentials.... The post Identity Gaps: The Need to Use Both x.509 & FIDO appeared first on Axiad ...