Customer Identity Cloud enhancements to prevent account takeover

Recapping features introduced under the Okta Secure Identity Commitment to safeguard our infrastructure, our customers, and our customers’ customers Identity is under attack — by ransomware groups, nation-state actors, malicious insiders, and other cybercriminals — and, in recent years, it has emerged as the primary enterprise security entry point…

Customer Identity Cloud and accessible authentication

At Okta, we endeavour to build a world where everyone can safely use any technology, powered by their identity. Our definition of “everyone” includes people who rely on assistive technology to access and engage with digital products, services, and applications.  This May 16th, Okta joins our partners, customers and the world in acknowledging…

Inside Okta’s new brand campaign

Imagine if you were free. Free from the old ways of doing things. From outdated tools and inefficient workflows, from forgotten passwords and frustrated IT teams. Free from the burdens of bad actors, painful user experiences, and costly security breaches. What if you were free from all that? What would you focus on instead? What impossible things…

Ready to deliver better customer experiences? No-code Identity orchestration is your answer

Call it an ace in the hole, a linchpin, or the “secret sauce,” but that’s what extensibility is. It’s the key to ensuring adaptability and scalability in an ever-evolving digital landscape.  Today, we’re excited to share the latest innovation for the Customer Identity Cloud Actions platform: Forms for Actions. We designed this new no-code visual…

Navigating credential and fraud risks: The phishing resistance authenticator effect

Image generated using DALL·E 2   This blog explores the robust security benefits of phishing-resistant authenticators, which can significantly bolster an organisation’s cybersecurity measures beyond the scope of phishing attacks. The percentage of phishing-resistant authentications serves as a tangible indicator of an organisation’s proactive use…

Build your app or service right from the get-go

Save with an Identity solution that won’t slow you down as you scale TL;DR Don’t want to add another web page to the to-read list? We have an easy, on-the-go version here available for immediate download.  The process of building up your app or service involves not just, well, building the app or service, but also the foundational tech you need…

How AI impacts the SMB threat landscape

Artificial intelligence (AI), and specifically generative AI (GenAI), is helping jumpstart revolutions in various industries. Unfortunately, some of this technology’s earliest and most aggressive adopters have been cyberattackers. The exponential growth in GenAI capabilities has proven irresistible, allowing even novice criminals to conduct…

Archive

Follow Us
Share on Linkedin Share on Youtube