News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Zero Trust Best Practices
Zero Trust Best Practices

The rapid shift towards more remote work and the associated explosion in devices has dramatically increased the number of cyber threats. With this in mind, organizations face the challenge of protecting their highly complex cloud-based technology ecosystems as people, software and even partner organizations can pose a threat to the security of valuable systems and data. As a result, the Zero Trust approach has established itself as a popular security framework. Analyst firm Markets and Markets forecasts that global spending on Zero Trust-based software and services will grow to $27,4 billion in 2022 from $60,7 billion.

Read more

Cloud: Sticking to passwords despite security risks
Cloud: Sticking to passwords despite security risks

A new industry study reveals that half of cloud professionals surveyed are frustrated with password hygiene requirements. But the experts want to stick to the passwords, although there are secure alternatives with MFA. A survey at Cloud Expo Europe provides information. Even most cloud professionals still cling to the use of passwords, despite their well-known security vulnerabilities, their value as a target for cybercriminals, and widespread user frustration with the complexity of proper password management. That's according to a new industry study...

Read more

Employees want an alternative to the password
Employees want an alternative to the password

A survey of 1.010 employees reveals common mistakes and problems related to passwords. 45 percent of employees in German companies would like an alternative to the password. Almost every fifth German uses the names of pets, children or their favorite football team as passwords. This is according to a study by Beyond Identity, the invisible multi-factor authentication (MFA) provider. More than 1.000 German employees were asked about password hygiene and the most common mistakes made when using passwords were made visible. The most important results at a glance 42 percent of those surveyed already have more…

Read more

After home office: Management of mobile devices in companies 
After home office: Management of mobile devices in companies

As a result of the pandemic, IT administrators around the world have faced numerous new challenges. The rapid shift to remote working has brought with it entirely new security risks and threats that were previously unthought of. Many mobile devices are now returning to the office. Companies should have a good strategy for this. 5 Mobile Device Management Best Practices from Beyond Identity. Now it's time to review mobile device management practices. While many companies are bringing their employees back into the office, a significant number of them continue to be completely...

Read more

Beyond Identity joins Microsoft Intelligent Security Association
Beyond Identity joins Microsoft Intelligent Security Association

Beyond Identity was nominated for membership in the Microsoft Intelligent Security Association - MISA because its platform leverages the device management capabilities of Microsoft's Endpoint Manager to make risk-based authentication decisions. Beyond Identity becomes a member of the Microsoft Intelligent Security Association (MISA). MISA is an association of independent software vendors and managed security service providers who have integrated their solutions with Microsoft's security products to help mutual customers better protect themselves against increasing cyber threats. To be eligible for MISA, companies must be nominated by Microsoft…

Read more