ThreatInsights

Navigating credential and fraud risks: The phishing resistance authenticator effect

Image generated using DALL·E 2   This blog explores the robust security benefits of phishing-resistant authenticators, which can significantly bolster an organization’s cybersecurity measures beyond the scope of phishing attacks. The percentage of phishing-resistant authentications serves as a tangible indicator of an organization’s proactive use…

How AI impacts the SMB threat landscape

Artificial intelligence (AI), and specifically generative AI (GenAI), is helping jumpstart revolutions in various industries. Unfortunately, some of this technology’s earliest and most aggressive adopters have been cyberattackers. The exponential growth in GenAI capabilities has proven irresistible, allowing even novice criminals to conduct…

Okta Access Gateway + ThreatInsights = Protecting On-Prem Apps

At Okta, we love to secure access to everything from a single platform. This, of course, includes on-premises apps. As spoiled here, our specialists wanted to weigh in on how OAG is at its best when paired with the features that make up the Okta platform. In other words, we’re giving you the Secret Sauce! This month, Senior Solutions Engineer, Bob…

Archive