Axiad IDS, Inc.


Axiad Blog

July Blog Post_Postcard.png

FIDO Alliance takes aim at two new cybersecurity challenges. Why should your enterprise care?

Last month FIDO Alliance announced a creation of two new working groups: The Identity Verification and Binding working group (IDWG) and the IoT Technical working group (IoTTWG). In this blog post we explore what cybersecurity challenges these groups are planned to tackle and why your enterprise should start paying attention.

Are you doing everything you can to mitigate your cybersecurity risks?

Are You Doing Everything You Can to Mitigate Your Cyber Security Risks?

In the nine years Axiad has been in business, there has been one constant: our customers are at the core of everything we do – throughout the life of any project. Deploying MFA and PKI through the cloud removes a lot of the complexity and integration cost. However, making sure that users, machines, and interactions are protected across the whole ecosystem is more important than ever. Plus, the enterprise ecosystem is constantly evolving. This is where having a team of experts is critical.  

Frictionless Experience Axiad ID Cloud

What’s All the Hype about Frictionless?

The reason frictionless experience is such a hot topic is that cybersecurity experts recognize the importance of making it easy for user populations to follow critical security procedures, but all too often, an organization’s goal to deliver a frictionless solution stops at the “end user” experience without looking at the big picture — without factoring in all of its different populations, roles and responsibilities…

March Blog 2 Trust, But Verify.png

Let’s talk - Trust, but verify - 5 tips for selecting a cloud authentication solution

There’s an “arms race” going on between the hackers and the cybersecurity professionals. As lines of defense improve, the bad guys look for the next weak link. And as MFA becomes prevalent, hackers are looking for ways to circumvent it. Hackers tend to be driven by two factors: 1) How easy it is to break into, and 2) what the reward is…


Let’s talk - RSA 2019: Reflections from the show floor

As I was walking through the event floor at RSA last week, I was struck by the number of authentication solution vendors claiming to have found the silver bullet for the replacement of passwords. So many different product claims ringing through the halls - passwordless, frictionless, zero trust - all pointing toward a world without passwords…


Let’s talk - Unleash Your YubiKey:
When is Two-Factor Authentication the right option for your enterprise?

In our work with enterprise organizations, YubiKeys are perhaps, the most popular option for Multi-factor authentication. The YubiKey supports multiple methods for authentication, enabling the same key to be used across services and applications…Now, let me give you a real life example from one of our clients…In 2018, this manufacturer made the decision to deploy YubiKeys across its organization to protect its network and applications. It was an easy decision based upon the YubiKey’s stellar reputation for providing a great user experience and its flexibility in supporting multiple protocols…


Let’s talk - No more one-size fits all approach: transitioning to modern multi-factor authentication in the enterprise

Are your first-floor windows and front door secure but you’ve left a second-floor window unlocked?

Does this sound like a goofy question? Well, I just ask because it provides a great analogy for the approach too many organizations take to security. I personally, talk to customers about this issue every day — but it still amazes me, how many organizations are still taking a one-size-credential-fits-all approach — leaving enterprises vulnerable to a ‘second floor attack.’


Let’s talk - PKI: Ditching passwords for more security and convenience

The fact is… MFA solutions aren’t only more convenient but they are also more secure. And specifically, we are seeing public key infrastructure (PKI) emerge as one of the most relevant authentication methods for organizations looking to ditch passwords while adopting more security. Just imagine you are sitting in the Accounts Payable department at your company when you receive an email from your CEO…

November blog_postcard.png

Let’s talk - Weighing the risks of data protection in today’s complex, digital world

In recent conversations with enterprise customers, including healthcare and pharmaceutical leaders, there has been a reoccurring theme - data protection is complex - no matter the industry. When discussing data protection, authentication typically is the first criteria that comes to mind. Yes, authentication is critical to identifying “who” is accessing “what” in your organization. But protecting your privileged data through secure communications takes more than authentication…


Let’s talk - Who is a privileged user, really? You may be surprised by the answer

Imagine if one of your HR employees were to reveal sensitive information about salaries or litigation facing your enterprise in an email to the wrong person.  Think about a marketing manager who has access to the company’s social media channels, putting the enterprise at risk with a single racist remark. Or consider R&D professionals who have access to and exchange information about medicines being developed, FDA reports or clinical trials. What if their private digital conversations were breached…


Let's talk - Managing the Complexities of Cybersecurity — We’ve Got Your Back

You can’t scan the morning news without finding a story about the latest cybersecurity threat. The good news: there are a lot of smart people working to make sure technology keeps pace — making it more and more difficult for the bad guys to breach your data. The bad news: new cybersecurity technologies are complex and the talent required to manage these security solutions is scarce. According to a March 2017 Forbes article*, the ISACA, a non-profit information security advocacy group, predicts there will be a global shortage of two million cybersecurity professionals by 2019....


Real Life - Mobile Eerything but with some caveats

Today our mobile devices are an intricate part of our everyday life. If I accidentally drive away from my home without my cell phone — I will turn around and go back for it even if it means I’m going to be late for my next appointment. Just like most of you, I no longer memorize phone numbers and other contact information because it is stored in my cell phone. Same with my calendar,  I organize my day via the calendar on my cell phone which in turn syncs with my work computer. This said there are limits to what I will and won’t carry (for the company) on my personal mobile device. This months blog explores this reality recognizing mobile EVERYTHING is on the rise, but highlights just one example as to why mobile phones — while prevalent — won’t work in every situation. Imagine being a CIO or CSO or IT manager trying to figure out how to securely operate and manage an enterprise with all of these variable situations...


Real Life: Why good cybersecurity practices matter — in the office and on-the-road

This month’s blog gets real. I usually try not to mix my work life with my personal life but sometimes the two become unexpectedly intertwined. This was the case when my car was broken into just after the the first of the year. My laptop and phone were stolen and for the first time since working at Axiad IDS, I put our security solutions and amazing security team to the test… 


Let’s talk - This year’s data breached extended to you and me – The consumers who trusted organizations to protect their data

In this role, I’ve observed an interesting (and worrisome) trend. No longer do attackers exclusively target the business operations of corporations. In 2017 we increasingly witnessed and felt the impact of cyber attacks on consumers. Why is it important to be aware of these risks? Well there are a couple of reasons. One, knowing the increased risk as consumers, we need to demand that the organizations we give our business take the precautionary measures required to protect our personal data...


Let's talk - A new blog series from Axiad IDS. First post featuring the looming deadline to comply with NIST SP800-171

I looked at the calendar this morning and thought, it’s time for me to make some noise! For months (actually this entire year), I’ve been informing customers about the looming deadline to comply with NIST Special Publication 800-171.  It is now the end of November and it’s all getting very real — just one short month until the December 2017 deadline...