The Impact of Quantum Computing on Cybersecurity

Quantum computing is a fast-emerging area of computer science that is upending the foundations of cybersecurity. It’s set to change how we secure our everyday communications, process credit cards, store data, and securely connect to websites. But it’s also likely to disrupt modern security as we know it. What is quantum computing? Conventional…

What is Federation and Why Should Your Apps Support it?

In the days before widespread use of the web, a user would log into a single server (or a handful of servers) and only have to remember one or two passwords. Applications were assumed to be for a single user, and didn’t require login credentials. Then, as the internet began to gain popularity and applications begin to be run on the web, the number…

Putting the 8 Principles of Infrastructure Access into Practise

IT and security teams want to protect sensitive data and systems from online threats to preserve both the bottom line and their organisation’s reputation. This means securing access to cloud and on-prem infrastructure. But legacy techniques have largely failed users and IT administrators in this regard—it’s time for a modern approach. Why have…

Hello, Okta Advanced Server Access

We’re excited to launch Okta Advanced Server Access, a new product available today that brings continuous, contextual access management to secure cloud infrastructure. Advanced Server Access centralises access controls for organisations leveraging on-premises, hybrid, and cloud infrastructure in a seamless manner to mitigate the risk of credential…

What is WebAuthn?

In March 2019, the World Wide Web Consortium (W3C) announced that WebAuthn is now the official web standard for password-free login. With support from a broad set of applications (Microsoft Edge, Chrome, Firefox, Mobile), widespread adoption of WebAuthn is expected in coming years. In this post, we will explore the shortcomings of current…

What is Authentication? The Ultimate Authentication Playbook

With the rise of credential stuffing and similar attack methods, simple username and password authentication is not enough to deter bad actors.   According to the Verizon Data Breach Investigations Report, there were over 55,000 security incidents and 2,200 confirmed data breaches in 2018, with a whopping 81% of those incidents being tied to…

Understanding FIDO Standards: Your Go-To Guide

FIDO is an acronym that comes from the Latin fido, meaning ‘to trust’, which was popularised by Abraham Lincoln—who borrowed it to name his dog. It’s a fitting name for man’s best friend, and just as appropriate in the security world, where trust is key. A more technical reference, FIDO (Fast IDentity Online), emerged in 2012 and is backed by a…

FACT OR FICTION: SSO Is the Same as a Password Manager

    At Okta, we are highly invested in the latest ideas and practises around authentication and security—and that requires some myth busting. This blog is the first in a series of posts meant to tackle common misunderstandings and myths around Single Sign On. See below for our full list of the myths we've seen (and busted!) around SSO. Single…

Archive

Follow Us
Share on Linkedin Share on Youtube