Okta Releases FIPS 140-2 Validated Encryption in Okta Verify

Credential phishing is a real and growing threat, and multi-factor authentication (MFA) is an effective protection against it. The strength of MFA lies in its requirement to present additional valid factors, beyond a password, to gain access, thwarting would-be attackers. But not all factors are created equal. Some factors, like security questions…

Using SIEM and Identity to Protect Against Data Breaches

“We are what we repeatedly do“ is a common paraphrase of Aristotle—though if he were around today, his sentiment might be more like “we are what we search, click, or connect to.” As security professionals well know, there’s a lot to learn from how we use technology. The interactions between users, applications, networks, devices, and APIs all…

3 Ways to Stop Account Takeovers Before They Begin

To put it bluntly, 2018 was a bad year for data security. Major consumer-facing corporations like Marriott and Facebook experienced some of the largest data breaches in history, exposing the data of millions of consumers. In total, 2018 saw an overall increase in compromised company records of 133% YoY, with an average of 291 records stolen every…

User Management: Designing for Security

At Okta, we see our customers deploy and build a broad range of customer-facing apps. Commonly, these apps support differing audiences, often reflected as segments within a single company, identities across customer companies, or users that span into partner organizations. Which begs the question: how to centrally manage these diverse users while…

From Zero to IPO: A New Podcast for Entrepreneurs

A lot can change in ten years. When Todd and I decided to start a company together in 2009, we were two entrepreneurs with a check from Ben Horowitz (we were a16z’s first cloud investment), some borrowed desks in Jawbone’s office, and a name — SaaSure — that we quickly replaced. After 10 years of blood, sweat and a few tears, Okta has evolved into…

Configuring Progressive Profiling for Your Custom Apps

At Okta, we see our customers deploy and build a broad range of customer-facing applications. At times, the completeness of a user profile may vary, depending on what is initially known about the user and any additional information that accrued over time. Progressive profiling is used to incrementally collect profile data over time, as a…

User Management: An Afterthought for Some, Prerequisite for Others

You’ve just adopted a new service! Great! But no one is using it. Why not? It appears that no one has access to the application, so no one wants to create a new account with a new set of credentials. Even worse, the team who created the system failed to port over all the users. Would you want to use such a system? This scenario may sound odd, but…

Understanding FIDO Standards: Your Go-To Guide

FIDO is an acronym that comes from the Latin fido, meaning ‘to trust’, which was popularised by Abraham Lincoln—who borrowed it to name his dog. It’s a fitting name for man’s best friend, and just as appropriate in the security world, where trust is key. A more technical reference, FIDO (Fast IDentity Online), emerged in 2012 and is backed by a…

The Connective Tissue: How APIs Drive Business Growth

Most of the pivotal developments in human history have facilitated better connection. From written language to the Gutenberg printing press, whenever we improve our communication, society as a whole leaps forward. In the digital era, the internet revolutionized our lives by enabling instant global communication. This paved the way for what could…

One-Minute Webinar: Zero Trust in Practice

Too busy to watch the Zero Trust in Practice webinar? Don’t worry—we’ve got you covered. There’s a lot of hype around Zero Trust security, but it’s proving to be more than just theory. Trust used to be a binary decision determined by the network, but as organizations move to mobile and cloud based services, the perimeter as we knew it has…

Archive

Follow Us