Passkeys: The Future of Passwordless Authentication

Passkeys: The Future of Passwordless Authentication

Say goodbye to passwords! Passkeys are the next generation of authentication, offering enhanced security and convenience. Learn how passkeys work, their benefits over passwords, and why they are the future of secure ...
What’s the State of Identity Assurance Today? Recap of the 2024 Report

What’s the State of Identity Assurance Today? Recap of the 2024 Report

Identity security is at a crossroads. As digital transformation accelerates, organizations are increasingly vulnerable to identity-focused attacks, which are now the primary entry point for cybercriminals. The incorporation of artificial intelligence (AI) ...
HYPR and Microsoft Partner on Entra ID External Authentication Methods

HYPR and Microsoft Partner on Entra ID External Authentication Methods

Last week, Microsoft announced the public preview of external authentication methods (EAM) for Entra ID. As a close partner, HYPR has worked extensively with Microsoft on the new offering and we are ...
Best Practices to Strengthen VPN Security

Best Practices to Strengthen VPN Security

Virtual private networks (VPNs) form a staple of the modern work environment. VPNs provide an essential layer of protection for employees working remotely or across multiple office locations, encrypting data traffic to ...
passwords, credentials, passkeys, passwordless, passwordless authentication, future, passwords, passkeys, 1Password passwordless credential stuffing Password We Still Use Bad Passwords

Mapping Your Path to Passwordless

Navigating the shift to passwordless authentication via digital certificates demands a visionary approach that considers the immediate benefits while strategically planning for future scalability and adaptability ...
Security Boulevard
Aligning With NSA’s Cloud Security Guidance: Four Takeaways

Aligning With NSA’s Cloud Security Guidance: Four Takeaways

The National Security Agency (NSA), in conjunction with the Cybersecurity and Infrastructure Security Agency (CISA), recently released its “Top Ten Cloud Security Mitigation Strategies” for organizations to make their cloud environments more ...
Protecting Against Attacks on NTLM Authentication

Protecting Against Attacks on NTLM Authentication

When it comes to cyberattacks, March has come in like a lion for Microsoft. Last week, Microsoft said in an SEC filing that that information stolen in a hack of senior leaders’ ...
Using Deterministic Security Controls To Stop Generative AI Attacks

Using Deterministic Security Controls To Stop Generative AI Attacks

Deepfake cyberattacks, phishing, and social engineering have all received a turbo boost in recent months due to the proliferation of easily accessed AI tools. Cybercriminals are some of the most creative individuals ...