Our Enduring Identity: 10 Years of Okta

This email was sent to Okta employees this morning. Hi Everyone, This week, we’re celebrating a decade of Okta. Whether you’ve been with us for years or just joined last week, this week is about you. It’s about what you’ve built, and more importantly, what you’re building. Leading up to the week, we asked what you love about Okta. The most common…

3 Ways to Stop Account Takeovers Before They Begin

To put it bluntly, 2018 was a bad year for data security. Major consumer-facing corporations like Marriott and Facebook experienced some of the largest data breaches in history, exposing the data of millions of consumers. In total, 2018 saw an overall increase in compromised company records of 133% YoY, with an average of 291 records stolen every…

GDPR, Privacy and Consent Management: How Okta Can Support Your CIAM Requirements

Beginning on May 25, 2018, the General Data Protection Regulation (GDPR) became officially enforceable. This new regulation is now top of mind for any organisation storing and processing EU citizen data. Consumer-facing apps and sites are of particular sensitivity. The challenge is that while the GDPR provides guidelines for compliance, it is not…

FACT OR FICTION: SSO is Difficult to Deploy

At Okta, we are highly invested in sharing the latest ideas and practices around authentication and security—and that requires some myth busting. This blog is the fourth in a series of posts meant to tackle common misunderstandings and myths around single sign-on (SSO). See below for our full list of the myths we've seen (and busted!) around SSO…

How Adaptive MFA Helps with Mitigating Brute-Force Attacks

Before public cloud services, computing infrastructure was expensive, hosted on-premises, and reserved for big enterprises and universities. Now, anyone with a credit card can access an unlimited supply of cloud apps and computing power. While cloud services offer many benefits, the accessibility of the cloud has also made identity attacks…

One-Minute Webinar: Top Trends in CIAM

We recently delivered a webinar featuring Gartner research on the latest trends impacting customer identity and access management (CIAM). Gartner’s Research Vice President Mary Ruddy presented findings from her March 2018 research, Top 5 Trends in CIAM Solution Design. Discussion in the webinar included the challenges organizations face in keeping…

What Could a Passwordless Workplace Look Like?

Passwords have been a constant throughout our digital “coming of age”. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources. Passwords are so deeply ingrained into our web apps and accounts, it can be challenging to imagine…

A Data Breach Risk Assessment Checklist

When it comes to data security, there’s no such thing as too big to fail. Chances are, if you’ve switched on the news recently you’ve heard of at least one high-profile data breach. Perhaps of even greater concern is that a few large organisations have fallen victim to multiple data breaches in the past few years. This is a surefire sign that…

Archive

Follow Us
Share on Linkedin Share on Youtube