MFA

Centralized Access Management Needs to Be Secure and Selective

Give a kid free reign in a candy shop, and you know what will happen. They won't fill their bag with gummy bears alone—they’ll go for a mix of different treats! Gummy worms, sour patches, peanut butter cups, M&Ms, you know the list. Much like a kid in a candy shop, the modern employee now demands the freedom to use best of breed applications…

We’re Looking at the Future, and It Doesn't Have Passwords

We’re rapidly moving towards the enterprise of the future—but what does that look like? It could be a place where employees have intelligent interactions with machines, or an environment where commuting becomes obsolete because we can show up to meetings as holograms. No one can say for sure what the future looks like—but based on today’s trends,…

3 Data Breach Myths Debunked

As the ever-shifting security and threat landscape continues to evolve, it can be tough to distinguish security fact from fiction. Some common data breach misconceptions can seriously misinform your organization’s security strategy. In this post, we’ll touch on three of the most common data breach myths, and share some information on why they don…

How Much Are Password Resets Costing Your Company?

Your users are trying to hit deadlines, prepare for meetings, and balance responsibilities. They don’t want to slow down to gain access to the apps and systems they need to get their job done. Yet often, users are frustrated by the expectation of memorizing the dozens of URLs, usernames, and passwords they need to do their work. Most people can’t…

Dogfooding Chronicles: How Okta uses Okta

In this episode of the Dogfooding Chronicles, we want to go into the basics, and navigate you through Okta IT’s own use cases at a high level, stepping you through our environment and processes. We want to orient you to understand why we make the technology choices that we do. Our hope? You find this information so helpful, you’ll use some of it…

How FIDO2 + WebAuthn Offer a Seamless, Secure Login

For those not familiar with FIDO2, it is an improved version of the FIDO standard – popularly known for the U2F USB tokens provided by Google and Yubico. Now that we've explored what Webauthn is and reviewed critical Webauthn building blocks and protocols, I’ll use this post to break down how you can leverage WebAuthn with FIDO2 to enhance both…

Never Do Your Own Taxes—or Your Own Auth! (Mostly)

It’s Tax Day. A day of dread for some, an annual routine for others. Can you think of any other financially impactful space where a DIY vs professional choice is so widely debated? Sure, when you’re just starting out, you can do a lot of things on your own without too much damage. But as you grow and obtain new assets, you may want to hire…

The Ultimate Guide to FIDO2 and WebAuthn Terminology

In March 2019, the World Wide Web Consortium (W3C) announced that WebAuthn is now the official web standard for password-free login. With support from a broad set of applications (Microsoft Edge, Chrome, Firefox, Mobile), widespread adoption of WebAuthn is expected in coming years. In a previous blog post we went through some examples of how…

Archive