Compliance and Consent: The Privacy Factors that Help Drive User Trust

If there’s one thing we took away from this year’s RSA Conference, it’s that privacy is top of mind for today’s organizations. But how can they abide by the many emerging privacy regulations without creating tedious user experiences? The answer: by adopting secure data handling practices that build user trust—while still providing delightful…

Putting Privacy First: Takeaways from RSA Conference 2020

What happens when you put hundreds of security professionals in a room? They come together to identify and discuss the emerging cybersecurity trends, challenges, and opportunities. At this year’s RSA Conference, the theme was “Human Element,” reminding us that every technology-related decision, innovation, and risk has direct impacts on…

Building Consumer Trust: 4 Challenges to Offering Secure User Authentication

No brand can be successful without customer trust. But as organizations handle and store more customer data than ever—data that’s increasingly targeted by cyber criminals—that trust is harder to earn and even harder to keep. In my previous post, I discussed the various stages of the customer journey that are crucial to building and retaining user…

4 Steps to Building Consumer Trust

As cyber criminals become more refined in their exploits, customers and their personal information are being increasingly targeted—and that poses a growing threat to organizations. Today, according to the Ponemon Institute, the cost of a data breach is $3.92 million, including non-operational factors like reduced brand engagement and compromised…

Safer Internet Day: 6 Tips to Help Keep Your Kids Safe Online

At Okta, we understand the value of keeping user identities safe. We often talk about protecting customer and workplace identities—and how that’s a valuable step in safeguarding your organization from a breach. But there’s another demographic group that’s just as important to protect: kids and teens. As the world becomes more digitally enabled,…

Why Your Customers Need Passwordless Authentication

In today’s threat landscape, passwords have become increasingly ineffective for protecting customer authentication and data—and they’re also unintended inhibitors for user experience. As such, it’s not surprising that many organizations are exploring passwordless authentication as a more secure, user-friendly alternative. In our previous post in…

What Are the Elements of Identity Proofing?

This series aims to help companies understand the basics of identity proofing and implement it effectively. In our first post, we explored how identity proofing has been defined by the National Institute of Standards and Technology (NIST). We also contextualized it within how companies validate the identities of their customers and prevent modern…

Passwordless Authentication: Where to start

Let’s face it: we’re all tired of passwords. They’re a major pain for users and not nearly as effective at securing accounts as they pretend to be. Thankfully, there is a better way! We are excited to announce a new set of passwordless capabilities in Okta that will allow you to deliver seamless auth experiences to all users! In this post, we’ll…

What Is Identity Proofing?

Every day, we engage with an ever-growing number of applications and digital services—and each of them wants to know (and validate) that we are who we say we are. As companies try to combat the prevalence of large-scale data breaches, the adage ‘on the internet, nobody knows you’re a dog’ is losing its validity. In fact, it’s getting more and more…

The Impact of Quantum Computing on Cybersecurity

Quantum computing is a fast-emerging area of computer science that is upending the foundations of cybersecurity. It’s set to change how we secure our everyday communications, process credit cards, store data, and securely connect to websites. But it’s also likely to disrupt modern security as we know it. What is quantum computing? Conventional…