Zero Trust in Europe: Special Considerations in an Evolving Regulatory Climate

In this blog we explore some of the special regulatory considerations organisations should understand when adopting a Zero Trust strategy in Europe. As enterprise technology ecosystems evolve to include a growing number of cloud resources, mobile and employee-owned devices, and digital business processes, the traditional approaches to securing…

Solving the retail supply chain crisis with identity

Many organisations were vastly underprepared for the massive supply chain disruptions triggered by the COVID-19 pandemic. As logistical operations hit lockdown, supply chain efficiency, security, customer experience, and brand reputations all suffered terribly – with retail considered one of the industries most heavily impacted by the crisis. Fast…

Why Seamless Customer Experiences Start With Stronger Auth

Customers today are demanding more from your digital platforms. They want safer, faster, and more seamless digital experiences, and they reserve their trust for the brands that can balance that scale between speed and security. In the most recent episode of Okta and Computer Weekly’s Identity Made Easy video podcast series, we explored how…

Are Your Customers Safe from Account Takeovers?

Criminals love customer credentials. It’s driving a surge in account takeover (ATO) attacks, in which hackers exploit stolen usernames and passwords to infiltrate user accounts and steal valuable data. So what can businesses do to mitigate this threat, and protect their customers, finances and reputation? In this episode of Okta and Computer…

Why Advanced Identity Strategies Are Needed to Futureproof Customer Experience

In today’s fast-paced, always-on retail environment, what does the perfect shopping experience look like? Maybe it’s something as simple and prosaic as buying a Coke from the local corner shop. The customer grabs the cold drink, pays with cash, a card or a swipe of their iPhone, and continues on their way. The transaction is quick, convenient and…

Four IAM Best Practices to Secure Customer Identity

61% of 2021 breaches involved credentials. Almost every company has employees, users, and/or customers who enjoy access to proprietary information and critical data. And while this information may not be accessible via direct links, they may still inadvertently gain access to content they shouldn’t have. These same companies often struggle with…

What Are the Types of Password Attacks and How Can You Prevent Them?

Traditional authentication using a username and password has been the foundation of digital identity and security for over 50 years. However, as organisations rely on a greater number of tools and applications, they face a greater risk of password attack. According to our latest Businesses at Work report, the average number of corporate and…

Meet the Expert: Josh Pritchett

Connecting roughly 50 million unique users within a network of clinics, offices, practitioners, and specialists across the USA means securely storing extremely sensitive data—then sharing it with thousands of healthcare providers, partners, and vendors. This responsibility is embraced by the Okta customer facilitating this network, despite the…

Why Identity Is the Foundation for Tomorrow’s Resilient Digital Workplace

It might have started in the United States, but the Great Resignation is coming to Europe. According to IDC Research’s 2022 European Future of Work Survey, as many as one in every three employees within Europe is currently thinking about changing jobs. Even more would be open to the possibility if they were to receive an attractive offer. What’s…

Archive

Follow Us
Share on Linkedin Share on Youtube