CCPA vs. GDPR: Similarities and Differences Explained

The California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) are laws that emerged to give individuals greater power over their personal information. Both regulate organisations that collect and use data in a variety of ways. A brief summary of the CCPA: Gives California residents increased transparency and control…

Exploring the symbiotic relationship that is Digital Trust

Okta recently published the Digital Trust Index. The whitepaper explores the notion of how trust is built, maintained and broken in a digital world, by capturing the sentiments of more than 13,000 office workers. Understanding digital trust means examining its three related facets: ability, reliability and truth. Belief that someone or something…

Two-Factor Authentication vs. Multi-Factor Authentication: What Are the Risks?

Being authentic is a high term of praise—if we think people are authentic, we believe them to be trustworthy, loyal, and dependable. There's a similar concept in computer security. Business networks are crucial to protect, so firms want only authorised people accessing them. In cybersecurity, authentication means verifying that a person or device…

Oktane21: Unite

Oktane21 marks our second all-virtual Oktane conference, and just over a year since we’ve seen our employees, customers, and partners in person. While we’re eager to safely gather in-person again someday soon, we’re also excited to bring you our most creative virtual Oktane experience yet. This year, we’ve unveiled a new centerpiece for the event:…

Okta Privileged Access: Unlocking Zero Trust Security at the Infrastructure Level

Every company that operates production software has compliance requirements. The vast majority of those organisations also carry significant infrastructure in the cloud and/or on-premises. And they all require a safe way to provide access to their developer workforce. Traditionally, there were two ways to achieve this: building a DIY system to…

Okta Identity Governance: Modern, Cloud-Based IGA

Since the 2000s, companies have turned to Identity Governance and Administration (IGA) software to achieve automation and compliance outcomes. But the traditional IGA systems we’ve come to know have been costly, complex, and designed for on-premises applications and infrastructure. They simply don’t meet the needs of today’s dynamic, remote…

Introducing Okta’s New Risk Ecosystem API: A Fraud Fighting Toolset to Secure Authentication and Delight Customers

Organisations across every industry are expanding their technology initiatives to adapt to customer needs in a digital-first world. In today’s competitive economy, customers expect secure, seamless experiences that bridge the physical and digital divide. Thus, it’s imperative to delight customers with frictionless omni-channel touchpoints that don…

How We are Expanding the Okta Integration Network to Improve Customer Experiences in a Digital-First World

Over the past year, organizations have been under immense pressure to optimize customer experiences to keep pace with an increasingly digital-first world. But going digital from a customer-facing perspective isn’t an easy feat. It’s challenging, requiring tight integration across a wide range of technologies and cross-collaboration from many teams…

Archive

Follow Us
Share on Linkedin Share on Youtube