Phishing resistance in unmanaged iOS devices

Contributing to approximately 60% of all social engineering attacks and 36% of all data breaches, phishing claims the number one spot among cybercrimes. With 80–90% of all compromises originating from an unmanaged device, unmanaged iOS devices deserve a place at the top of your security concerns.     Okta FastPass Okta FastPass protects users…

Behind the scenes at Access Requests: Worker tasks

Image generated using DALL-E Background Okta’s inbox platform supports various products in Okta’s Workforce Identity Cloud, where human input is required. It is most notably instrumental in the Access Request flow of Okta Identity Governance. A lot of what we do is trigger-based. These triggers can be a human action — “grant access when the…

Okta joins the CNCF to shape the future of cloud computing

We're thrilled to announce that Okta, the leading independent Identity partner, is now a proud member of the Cloud Native Computing Foundation (CNCF). This partnership marks a step forward in our commitment to the ever-evolving world of cloud-native technologies and reaffirms our dedication to providing secure and seamless Identity and Access…

What is AI?

Artificial Intelligence (AI) may be organising our social media timelines and automatically improving the pictures on our phones, but it’s a field that’s widely misunderstood.  AI is, after all, an incredibly complex field in computer science, where the top researchers earn as much as NFL quarterback prospects. It introduces terms seldom found in…

What is NLP?

If you’ve ever taken an introductory programming class, there’s a good chance the instructor said: “Computers are stupid.” They only do what they’re told, and only within the confines of what can be represented in logic. The intent is to remind students that computers aren’t intelligent thinking machines — like Star Trek’s Data — but rather tools…

What is machine learning?

Patterns. The world is full of them, and we often don’t even notice.  Human language is a great example. We understand each other because things like verb conjugations and word order typically follow a rigid structure. The same is also true for music, where the predictability of rhythm and scales provide a measure of order and predictability.  If…

Why now is the time for IAM transformation in banking

We’ve hit a tipping point in the battle between traditional financial institutions (TradFi) and financial technology (fintech) disruptors. Digital banking (led by fintech) has become ubiquitous, with nearly universal adoption —  eight in 10 consumers now use some type of digital financial tool, and half of Americans use fintech tools on a daily…

It’s official: Zero Trust now favored by 96% of organisations

Zero Trust began as an abstract concept in 1994 and has evolved into an established security approach. More than 800 information security decision-makers around the world were surveyed to compile our latest report, The State of Zero Trust Security 2023. This report takes a detailed look at where Zero Trust adoption stands today, providing answers…

Archive

Follow Us
Share on Linkedin Share on Youtube