Authentication
Protecting Against Attacks on NTLM Authentication
When it comes to cyberattacks, March has come in like a lion for Microsoft. Last week, Microsoft said in an SEC filing that that information stolen in a hack of senior leaders’ ...
Navigating the NSA’s New Zero-Trust Guidelines
New guidelines from the NSA provide public sector and private organizations with the necessary framework to approach zero-trust ...
How to Adopt Phishing-Resistant MFA
In a recent blog post, we discussed what phishing-resistant multi-factor authentication (MFA) is and why... The post How to Adopt Phishing-Resistant MFA appeared first on Axiad ...
HYPR Featured Launch Partner for YubiKey Bio Multi-Protocol Edition (Early Access)
Today Yubico announced the expansion of its YubiKey Bio Series to include multi-protocol keys that support biometric authentication for FIDO and Smart Card/PIV protocols. Like other YubiKey Bio Series, the new multi-protocol ...
Using Deterministic Security Controls To Stop Generative AI Attacks
Deepfake cyberattacks, phishing, and social engineering have all received a turbo boost in recent months due to the proliferation of easily accessed AI tools. Cybercriminals are some of the most creative individuals ...
10 Ways to Fortify Authentication Systems
Verifying identity through authentication is a cornerstone of security. Here's how organizations can fortify their authentication systems ...
7 Ways to Authenticate Workloads to Each Other
7 min read Explore a critical evaluation of authentication methods, emphasizing their pivotal role in securing workload-to-workload communication for robust digital defense. The post 7 Ways to Authenticate Workloads to Each Other ...
Demystifying JWT, OAuth, OIDC, and SAML: A Technical Guide
Dive into a clear technical guide explaining JWT, OAuth, OIDC, and SAML. Learn their strengths and weaknesses and use cases to choose the right approach for your next project. Stay updated with ...
IGAaaS Vs. On-Premises IGA Solutions: A Comparative Analysis
Organizations have a choice between two primary approaches: IGA-as-a-service (IGAaaS) and traditional on-premises IGA solutions ...
Five Tips to Strengthen Know Your Employee (KYE) Processes
The modern work environment creates situations unthinkable a decade ago. Today, many employees will never step foot in an office or have face-to-face interactions with colleagues. While this flexible work model offers ...