How Adaptive MFA Helps with Mitigating Brute-Force Attacks

Before public cloud services, computing infrastructure was expensive, hosted on-premises, and reserved for big enterprises and universities. Now, anyone with a credit card can access an unlimited supply of cloud apps and computing power. While cloud services offer many benefits, the accessibility of the cloud has also made identity attacks…

How SaaS and Cloud Storage Is Shifting Your Security Perimeter

Modern organizations have embraced Software as a Service (SaaS) in a big way—and for good reason. Cost savings, increased efficiency, and boosted productivity are just some of the benefits of outsourcing IT solutions like email, app hosting, and data storage to independent third parties. In fact, solutions offered by cloud providers like Microsoft…

How Automated Onboarding Could Save Your Sanity

TL;DR: Giving users access to the tools they need is a challenge, and it’s getting tougher by the day. Automating that process could be the key to your success. Here’s why IT teams need automated provisioning, and how your own team can do it. IT departments today face two main challenges: The first is that people are changing jobs more often—at a…

Okta’s Annual 12 Days of Customers

As we prep our holiday shopping lists and pull out the festive sweaters, it’s almost time to look back on 2018. We want to use this season of reflection and cheer to showcase some of our many amazing customers. Our customers are the best gifts of all, so we’re celebrating with our annual 12 Days of Customers! JetBlue: The airline with a mission to…

One-Minute Webinar: Top Trends in CIAM

We recently delivered a webinar featuring Gartner research on the latest trends impacting customer identity and access management (CIAM). Gartner’s Research Vice President Mary Ruddy presented findings from her March 2018 research, Top 5 Trends in CIAM Solution Design. Discussion in the webinar included the challenges organizations face in keeping…

What Could a Passwordless Workplace Look Like?

Passwords have been a constant throughout our digital “coming of age”. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources. Passwords are so deeply ingrained into our web apps and accounts, it can be challenging to imagine…

WebAuthn, the Road to Passwordless, and Other Considerations

Passwords. Most of us have a love-hate relationship with them. Security best practices and common sense tells us to pick unique, hard-to-guess passwords for every account, which makes management of them a pain, or leads to bad password habits like reusing them. Then there’s the inherent security of passwords, or rather, the insecurity of them. As…

Digital Skills for Humanitarian Aid: How Tech Can Help

Source: Habitat for Humanity FacebookMore than ever, NGOs are leveraging technology for humanitarian aid, often in some of the most remote areas in the world. And, increasingly, “for vulnerable communities, access to connectivity is becoming as important to a successful future as access to food, water, and shelter”. The nonprofit sector, like many…

Archive

Follow Us
Share on Linkedin Share on Youtube