Industry Insight

Industry Insight

Unlocking SaaS Security: How Identity can help

SaaS developers and builders, SaaS users, enterprise security teams, and Identity Providers may all play seemingly disconnected roles in a SaaS environment. But everyone can support a unified SaaS Security strategy by focusing on Identity.  Read on to learn a simple three-pronged approach for kicking off your own SaaS security strategy.  What is…

Usability and utility: How users establish usefulness

Understanding usability may be your missing evaluator when establishing a product’s value. Like tech stacks, a human’s ability to process information affects product performance. Usability principles streamline how users process information and evaluate how useful a product is. Establishing product value When thinking about adding more value to a…

The Labubu blind box for your enterprise: Unmasking AI agents across industries

Imagine you're a security or IT leader, and your organization's digital landscape is like a collection of Labubu blind boxes. Each box represents a new AI agent or automated workflow. You know there's a non-human identity (NHI) or machine learning model in there, and it's intended to do something beneficial, like accelerate the US Department of…

How Auth0 mitigates OWASP’s agentic AI threats

AI-powered agents are changing the way we live, work, and interact with technology. A recent report found that 82% of companies plan to integrate AI agents in 1-3 years, whether it’s assisting with customer service, automating processes, or even making decisions on our behalf. However, as AI becomes more autonomous, it introduces new security…

3 MFA myths that are holding you back

How many times have you clicked “Remember this device” only to be hit with an SMS code the next time you log in? It’s annoying, inconsistent, and exactly why so many people assume Multi-Factor Authentication (MFA) is a friction-filled nightmare. But here's the truth: In today’s threat-heavy digital world, MFA isn’t optional. It’s essential…

Modern identity at work: Productivity meets security

Meet Sarah, a marketing manager at a medium-sized furniture company. Sarah remembers when she started as a marketing intern 10 years ago. She started her work days by entering her passwords multiple times, wrestling with cumbersome VPN connections, and submitting tedious access requests that could take days to fulfill. Today, her experience is…

Identity: Free the people who power your business

An identity solution accelerates your business by unlocking workforce productivity. It’s a bold statement, but that’s what’s happening in companies that have deployed modern identity solutions. They’ve improved access controls and strengthened their security posture while helping the organization focus on productivity, efficiency, and core…

How modern identity strategies shape enterprise security

Identity is no longer simply a login management system. It’s the most targeted layer in your infrastructure, and often the least connected. It's how users access data, how services interact, and, increasingly, how attackers get in. What used to be an admin function is now the foundation of your entire security posture. Our eBook, Secure Identity…

Archive