Tools for enforcing authentication policy

As the frequency and sophistication of cyberthreats continue to rise, organizations must urgently enforce phishing-resistant authentication protocols across every device and system.  Stolen credentials are the leading initial vector of attack in successful breaches, which means security teams need to arm themselves with a robust Identity strategy…

Secure device access: The missing key to your security strategy

Between work and home, how many devices are you using every day? The proliferation of portable devices has magnified the cybersecurity challenges facing organizations of all sizes.  For many businesses, the challenges of managing and securing IT assets have been amplified by “bring your own device” policies. As a result, IT organizations often no…

How Okta fosters a security culture

Jen Waugh joined Okta in May 2024 as Senior Director, Security Culture. One of Jen’s primary responsibilities is to apply her wealth of experience — spanning cybersecurity, governance, compliance, and leadership — to create and foster a security culture as a driving force behind Okta’s continued maturation as a security company. Recognizing that…

SMBs at Work 2024: What apps make the SMB stack?

In our SMBs at Work 2024 report, we explore how SMBs navigate today’s dynamic app landscape. Powered by anonymized data from over 18,000 companies and how they adopt thousands of applications in the Okta Integration Network, the report details how today’s growing companies are using applications and setting trends. Small and midsize businesses …

Open banking regulation in North America: A guide

By allowing consumers to securely share their financial information with trusted third-party providers like personal finance apps, open banking unlocks the trifecta of positive customer experience: greater convenience, more financial insights, and hyper-personalized services that improve how consumers move, manage, and make money.     In the era…

Identity Threat Protection with Okta AI

…now Generally Available A matter of Identity Security In today’s increasingly cloud-based world, Identity is the first, and in many cases, only persistent fingerprint enabling a user’s access to assets in the organization. As the control plane, Identity spans across the enterprise IT tech stack and intersects the data or access planes of device,…

Archive

Follow Us
Share on Linkedin Share on Youtube