The Path to Continuous Authentication: Solving the Best of Breed Problem

For years the network perimeter has been the foundation for controlling access to digital resources: kill the network, and the user no longer has access. Today’s cloud-first world has changed that, shifting the security perimeter to users and devices—and as companies continue to adopt best of breed solutions that enable their workforce, they need…

3 Experts Weigh in on the Future of Identity and Security

As companies move their infrastructure to the cloud, there are a number of unique challenges with modernizing identity management. At the forefront are concerns about keeping systems secure while still enabling access for end users that need it. With this in mind, we asked a panel of industry leaders to talk about challenges facing enterprise IT…

Addressing New NIST Guidelines with Okta Verify

The National Institute for Standards and Technology (NIST) generated some buzz yesterday with the release of its Digital Authentication Guideline draft. As part of its purview, NIST recommends national-level guidelines and rules for cryptography and secure communications. In the proposal, NIST recommends implementers consider authenticators other…