What Is CIAM & Why Does It Matter?

To satisfy evolving customer demands and deliver the desirable digital experiences that keep customers coming back, many organizations now turn to customer identity and access management (CIAM) for a solution. But what is CIAM and why does it matter? In today’s rapidly evolving and highly interconnected digital world, identity and access…

How Okta and BetterCloud secure your SaaS user interactions

The rise of user mobility and SaaS application adoption have drastically changed the landscape for access and security: more people are accessing more resources from more locations and more devices. Organizations must ensure that all users around the globe — whether remote employees, customers, partners, or contractors — can securely access data…

Okta + Yubico: Because Every User Is a Potential Target

The most critical security threats facing enterprises today are attacks targeted at user credentials. The average number of credential theft incidents has tripled over the past two years, and today, 81% of all hacking-related breaches leverage either stolen and/or weak passwords. Using passwords alone as a means of defense for organizations simply…

Let’s (Finally) Say Goodbye to Passwords

Finding the right authentication technology can be challenging. Companies strive for a solution that achieves the lowest risk of unauthorized access to their businesses' data, be that in the form of sensitive GDPR- and HIPAA-protected information or highly-confidential collateral stored in globally-distributed databases, without encumbering the…

Cover Your pASSword: Add PassProtect to Your Web Browser

There are over half a billion passwords floating around the Internet, largely exposed through data breaches. That’s 500,000,000+ of your, your friends’, your families’ passwords exposed to anyone and everyone. While the average person is generally aware security is important, they often don’t know what steps they can take to protect themselves…

Understanding MFA Factors: You’re Not Using the Right Ones

With the rise in both the number and sophistication of today’s security threats, the benefits of multi-factor authentication (MFA) have become widely recognized, leading to increased adoption across enterprise and consumer apps . From a security standpoint, this is all good news. We know that passwords alone are not enough to secure your data, and…

4 Compliance Regulations Every CISO Should Know

The job of a CISO is a tough one. Adaptability is key in a field where change is the only real constant, as new laws, evolving regulations, and increasingly complex security threats challenge even the most seasoned executive. While many of the regulations that CISOs deal with are industry specific, the approach to compliance (ensuring teams have…

The GDPR, Identity, and Your Organization

The General Data Protection Regulation (“GDPR”) ‘go-live’ date is just around the corner and, if I were a betting man, I’d say that odds are you aren’t adequately prepared. You might be thinking, “But hey, Joe, I have until May 2018 to get my house in order.” Truth is, that isn’t much time to audit the services, data and controls you have in place…

What you need to know about New York's cybersecurity regulation

Monday, August 28, 2017 marked the first compliance deadline for the New York Department of Financial Services' (NYDFS) cybersecurity regulation 23 NYCRR 500. For those of you in organizations regulated by the DFS, you probably already know 23 NYCRR 500 was first implemented in March last year with the goal of establishing minimum security…