Okta + Yubico: Because Every User Is a Potential Target

The most critical security threats facing enterprises today are attacks targeted at user credentials. The average number of credential theft incidents has tripled over the past two years, and today, 81% of all hacking-related breaches leverage either stolen and/or weak passwords. Using passwords alone as a means of defence for organisations simply…

Is Authentication Without a Password Secure?

Usernames and passwords have long been the standard when it comes to authentication, but it’s become very clear that this approach to security is fundamentally broken. The good news? Modern authentication technologies are making it possible to secure access in new ways and finally leave passwords behind. MFA leads the way The secret to doing away…

A Brief History of Zero Trust Security

The Forrester Zero Trust model, which has been around since 2009, argues that organisations should regard all network traffic as untrusted, regardless of where it’s coming from. The idea of a trusted internal perimeter leaves the organisation at risk if that perimeter is compromised or an insider turns malicious. Of course, the situation has…

How Okta Helps You Comply with PCI-DSS 3.2

As organisations continue to move critical services into the cloud, having strong, centralised identity becomes the foundation of a holistic security strategy. Continuing our efforts to support customers who use Okta to protect Cardholder Data Environments, we are pleased to announce that Okta has released a PCI-DSS Attestation of Compliance (AOC)…

3 Quick Ways to Increase Customer Data Security

Trust is the cornerstone of any successful customer relationship and organisations now have more opportunities than ever to gain that trust. In today’s interconnected world, companies are constantly handling sensitive customer data—and how they use and secure that data plays a huge role in determining the trust customers place in them. A breach…

Taking a Risk-Based Approach to Biometrics

Biometric authentication — using the unique biological characteristics of an individual to verify their identity — has been around since the dawn of humankind. Think about it: humans use facial and voice recognition every day to identify each other. Signature recognition came about when the first contracts were originally created, and fingerprints…

What is ADFS?

Active Directory Federation Services (ADFS) is a Single Sign-On (SSO) solution created by Microsoft. As a component of Windows Server operating systems, it provides users with authenticated access to applications that are not capable of using Integrated Windows Authentication (IWA) through Active Directory (AD). Developed to provide flexibility,…

Use Behavior and Context to Secure Access

The traditional perimeter which protected IT assets on the corporate network has become irrelevant. The proliferation of cloud-based services, such as email and online file sharing, being used to augment conventional in-house IT systems, and the rise of mobility where remote access from anywhere is required by your employees, partners and even…

Archive

Follow Us
Share on Linkedin Share on Youtube