Announcing Business Authentication – Add Sign In with Okta to Your Apps

You’ve most likely heard of (and experienced) social logins before. When signing up for a new website or app, instead of going through a tedious registration process, you’re given the option to use existing Facebook, Twitter, Google+, or LinkedIn credentials to gain access. This gives you access to more applications, without adding the burden of…

Let’s (Finally) Say Goodbye to Passwords

Finding the right authentication technology can be challenging. Companies strive for a solution that achieves the lowest risk of unauthorised access to their businesses' data, be that in the form of sensitive GDPR- and HIPAA-protected information or highly-confidential collateral stored in globally-distributed databases, without encumbering the…

Understanding MFA Factors: You’re Not Using the Right Ones

With the rise in both the number and sophistication of today’s security threats, the benefits of multi-factor authentication (MFA) have become widely recognised, leading to increased adoption across enterprise and consumer apps . From a security standpoint, this is all good news. We know that passwords alone are not enough to secure your data, and…

Biometrics for Authentication: The Risks and Potential Rewards

In the last ten years, biometric technology has morphed from something Hollywood villains use to secure their secret dungeons to something almost everyone has in their pocket. But while adoption of biometric security has seen explosive success, misconceptions about biometric authentication are still very common. Let's take a look at how secure…

Contextual Access Management: What Does It Actually Mean?

Today’s teams get the job done from wherever they need to and on whichever device they prefer. Their workplace may be within the traditional office environment, but it can also be at home, in a coffee shop, at a client site, or even a combination of these on any given day. The range of endpoints teams use—whether a laptop, a tablet, a mobile phone…

How Secure is Your VPN?

Operating a corporate VPN solution can be expensive, and sometimes feel like navigating a minefield. With high stakes and a confusing sea of available solutions, mistakes are frequent and costly. Your VPN is a critical layer of defence in your corporate network, and intrusion can have serious consequences. Take the Target and Home Depot breaches…

Security + Machine Learning: It’s No Silver Bullet

Gartner currently lists machine learning at the top of its hype cycle. The market is awash with products that claim to have built a better mousetrap, that better solve common problems. While the promise of machine learning is proven, what does this new approach hold for cybersecurity? Is this a silver bullet or just more lead? Even today, spam…

Is Passwordless Authentication Actually Secure?

Passwords are frustrating. We know they should be unique, but then they’re hard to remember. We know they should be complex, but then they’re even harder to remember and painful to create. Password managers mostly solve the problem for those savvy enough to use them and determined enough to set them up, but for the majority of the population, it’s…

It’s a New World with WebAuthn: Passwordless Authentication Goes Primetime

The vision of a secure, passwordless experience on the web has long been on the minds of security professionals and password-fatigued users. An open standard called Web Authentication (or “WebAuthn”) is rapidly progressing towards achieving that vision after hitting a major milestone this week. Specifically, on April 10 the World Wide Web…

Multi-factor Authentication: Because Phishing Happens

You’re at your desk, neck deep in deadlines (because aren’t we all) and suddenly, a notification appears. You have new mail! At first glance, it looks like the mundane Microsoft service notification email you usually ignore. Then, a moment of panic. What?! They’ve blocked my email?!? I need that! I have important things to do! You scroll quickly…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube