Leveraging Identity to discover vulnerabilities and determine proper access

Robust Identity protection starts before attackers reach your digital front door.   Identity is the most common vector of attack for bad actors looking to improperly access sensitive information. Over 80% of breaches stem from some form of credential abuse, making the task of reliably authenticating Identity a core concern for security leaders in…

Okta and Hiring Our Heroes: Empowering veterans through the Department of Defense’s SkillBridge

At Okta, we highly value the unique skills and attributes veterans bring to the table. We understand that excellence is ingrained in the military ethos, and we believe veterans possess skills invaluable in driving our mission.  That’s why we’ve partnered with Hiring Our Heroes (HOH) to become a host company for active service members participating…

Five Game-changing lessons I learned as a Product Manager intern at Okta

Curious about what it's like to be a Product Manager intern at a leading tech company? My time at Okta was packed with valuable insights and practical experiences. Here are the five key lessons I learned that can elevate your product management career. But first, a little about me: Hey, there. I’m Nouf. I like to think of myself as a wearer of…

Okta FastPass: Phishing-resistant MFA

Security practitioners worldwide face the same challenge: provide robust security and enhanced user experience. In a landscape of continued change and evolution, knowing all of our options becomes difficult. The seemingly elusive solution is to provide our end users with a seamless experience while requiring them to perform powerful, phishing…

What Is CIAM and why does it matter?

To satisfy evolving customer demands and deliver the desirable digital experiences that keep customers coming back, many organizations now turn to customer identity and access management (CIAM) for a solution. But what is CIAM and why does it matter? In today’s rapidly evolving and highly interconnected digital world, identity and access…

Three ways Customer Identity supports data compliance and security

Website logins. Mobile apps. Customer support portals. Chat. Digitizing the user experience means most companies have vast amounts of data on their clients, collected across multiple channels and stored in different systems.  Depending on the jurisdiction, industry, or type of data, your organization must comply with many regulations governing…

Archive

Follow Us
Share on Linkedin Share on Youtube