Biometrics for Authentication: The Risks and Potential Rewards

In the last ten years, biometric technology has morphed from something Hollywood villains use to secure their secret dungeons to something almost everyone has in their pocket. But while adoption of biometric security has seen explosive success, misconceptions about biometric authentication are still very common. Let's take a look at how secure…

Supporting the Office of Management and Budget’s Identity Policy Proposal

The White House Office of Management and Budget (OMB) is proposing a new policy to address Federal agencies’ implementation of Identity, Credential, and Access Management, and earlier this month asked for public comments on the policy draft. Tim McIntyre, our associate general counsel and data protection officer, submitted the below comment to the…

4 Guidelines that will Increase Data Security for Your Customers

User data security has been in the spotlight for years now. It seems like every week, if not every day, brings a report of a new breach or vulnerability discovered. From Target to Equifax JP Morgan Chase, it’s a scary world out there, and for many teams, the path to secure customer identity is vast, complicated, and difficult to navigate. A few…

Identity in the News – Week of April 30, 2018

Selections from the top news items this week in the world of identity and application security. Twitter advising all 330 million users to change passwords after bug exposed them in plain text From The Verge: Twitter is urging all of its more than 330 million users to immediately change their passwords after a bug exposed them in plain text. While…

Congratulations to the 2018 Oktane Award Finalists

Our customers are doing incredible things and we love to celebrate their achievements. By far the best opportunity to meet and learn from our customers is at Oktane. Highlighting individuals and companies around the world truly makes Oktane special. We want to go beyond telling you how valuable our customers are, we want to show you. The Oktane…

Contextual Access Management: What Does It Actually Mean?

Today’s teams get the job done from wherever they need to and on whichever device they prefer. Their workplace may be within the traditional office environment, but it can also be at home, in a coffee shop, at a client site, or even a combination of these on any given day. The range of endpoints teams use—whether a laptop, a tablet, a mobile phone…

Learning is Fun (Seriously): A Day in the Life with Jim Mollé

We all know being educated on the software you use is critical to success, but you’re probably not jumping out of your seat to get signed up for a five-day, online training. But before you roll your eyes, you’ll want to get to know our brilliant and always-entertaining Okta instructors, and Jim Mollé, senior technical instructor, is no exception…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube