MFA

A Data Breach Risk Assessment Checklist

When it comes to data security, there’s no such thing as too big to fail. Chances are, if you’ve switched on the news recently you’ve heard of at least one high-profile data breach. Perhaps of even greater concern is that a few large organizations have fallen victim to multiple data breaches in the past few years. This is a surefire sign that…

Learn to Integrate Okta and Oracle Weblogic with the LDAP Interface

Okta integrates everything—including Oracle WebLogic Server. In this post, I'll show you how to use the LDAP interface to integrate Okta with WebLogic.   When WLS and Okta work together Before we start: legacy app patterns Recently, we announced Integration Patterns for Legacy Applications, an eBook describing design patterns you can use to…

Is Authentication Without a Password Secure?

Usernames and passwords have long been the standard when it comes to authentication, but it’s become very clear that this approach to security is fundamentally broken. The good news? Modern authentication technologies are making it possible to secure access in new ways and finally leave passwords behind. MFA leads the way The secret to doing away…

One-Minute Webinar: IAM + MFA Insights from ESG + Okta

Too busy to watch the ESG + Okta Webinar: How Identity Fits Into a Security-First Approach? Don’t worry. We’ve got you covered. IT analyst firm Enterprise Strategy Group (ESG) recently conducted a study into identity and access management, and the challenges presented by the cloud and mobile computing wave. Spoiler alert: Identity can reduce…

How Secure is Your VPN?

Operating a corporate VPN solution can be expensive, and sometimes feel like navigating a minefield. With high stakes and a confusing sea of available solutions, mistakes are frequent and costly. Your VPN is a critical layer of defense in your corporate network, and intrusion can have serious consequences. Take the Target and Home Depot breaches…

Archive